Weekly CYBER NEWS
Technology
About
Stay ahead of the curve with a weekly briefing on the ever-evolving world of cybersecurity. Each episode delivers clear, expert breakdowns of the most critical stories ranging from major data breaches and ransomware campaigns to newly discovered vulnerabilities and emerging threat actor tactics. But it’s not just about the headlines. We’ll also share practical, everyday security tips like how to strengthen your passwords, avoid phishing scams, and keep your devices safe so you can put best practices into action and protect yourself in the digital world. Tune in weekly for concise insights, actionable advice, and a front-row seat to the events shaping cybersecurity today.
Episodes
- Bleeding Llama and poisoned water supplies
This episode of Weekly CYBER NEWS discusses major cybersecurity threats such as the Bleeding Llama vulnerability, a supply-chain attack via JDownloader, and breaches at Polish water treatment facilities. It also covers the Ivanti zero-day,…
- Cyber Threat Weekly: Water Plant Hacks, Linux Root Exploits & AI Agent Takeovers
This episode of Cyber Threat Weekly discusses cyberattacks on Polish water plants, a Linux privilege escalation exploit, and Ivanti zero-days. It also covers the Quasar RAT, a Trellix source code breach, and AI agent takeover vulnerabiliti…
- Cyber Threat Alert: OpenSSH Backdoor, AI Attacks Rising & Critical Infrastructure Breach
This episode discusses a decade-old OpenSSH vulnerability, the rise of AI prompt injection attacks, and a breach affecting critical infrastructure. It also covers attackers exploiting Microsoft Teams for malware delivery and the rapid weap…
- Cybersecurity Daily: OpenAI Supply Chain Scare, Adobe Zero-Day, Marimo RCE Exploits & APT37 Social Engineering (April 2026)
This episode covers April 2026 cyber threats, including an OpenAI supply chain scare, exploited vulnerabilities in Adobe Acrobat Reader and Marimo, and APT37's social engineering tactics using messaging apps. It also details a CPUID supply…
- Cybersecurity Alert: GPU Rowhammer Breakthrough, Medusa Ransomware Surge, AI RCE Exploits & Nation-State Attacks (April 2026)
This episode covers April 2026 cybersecurity threats, including GPU Rowhammer attacks bypassing protections, Medusa ransomware exploiting new vulnerabilities, and RCE flaws in AI platforms. It also discusses nation-state activities and ran…
- Weaponizing human trust to bypass security
This episode discusses major cybersecurity threats from April 2026, focusing on an npm supply chain attack, the Axios hack leveraging social engineering, a massive increase in device code phishing, a European Commission cloud breach via a…
- Cybersecurity Today: EU Cloud Breach, Axios Supply Chain Attack, React2Shell Exploits & $285M Crypto Hack (April 2026)
This episode of Cybersecurity Today covers significant April 2026 cyber threats, including an EU cloud breach, the Axios npm supply chain attack, React2Shell exploits, a $285M crypto hack, ShareFile vulnerabilities, and SparkCat malware, h…
- Cybersecurity Breakdown: Supply Chain Attacks, Chrome Zero-Day, AI Fraud Surge & Mobile Spyware Threats (April 2026)
This Cybersecurity Breakdown episode reviews April 2026 threats, including supply chain attacks, a Chrome zero-day, mobile spyware, and AI-powered fraud. It discusses implications for security professionals regarding supply chain security,…
- Hackers are hijacking our trusted software
This episode discusses recent cybersecurity threats, including supply chain compromises like the Axios npm attack and the rise of AI-driven fraud. It examines how attackers target trusted systems such as package managers and AI platforms,…
- Your security tools are now backdoors
This episode discusses how security tools can become backdoors, based on a daily intelligence report covering cyber threats, nation-state activity, and security trends.
- Breaking Trust: AI, Identity Systems, and the New Cyber Battleground
This episode covers major cybersecurity threats including OpenAI vulnerabilities, Citrix NetScaler exploitation, and new malware like DeepLoad. It highlights the shift of cyber risks towards AI, identity systems, and cloud platforms, discu…
- CyberStrikeAI Exploits and Motorola GrapheneOS Hardware
This week's cybersecurity update includes a ransomware attack on AkzoNobel, a data leak at LexisNexis, and the emergence of the AI tool CyberStrikeAI automating exploits. Motorola is partnering with GrapheneOS for privacy-focused devices,…
- Hackers Hire Actors and Poison NuGet Packages
This episode discusses the rise of social engineering recruitment, the link between zero-day exploits and nation-state actors, and supply chain attacks through malicious NuGet packages. It also covers exploitation of Cisco SD-WAN vulnerabi…
- Outlook Sleeper Agents and Stolen AI Souls
This cybersecurity news roundup covers actively exploited Chrome and Microsoft vulnerabilities, a critical BeyondTrust RCE, and a malicious Outlook add-in stealing credentials. It also discusses Android backdoors, ransomware using vulnerab…
- Firmware Backdoors and Stolen AI Souls
This episode covers major weekly cybersecurity stories such as firmware backdoors, stolen AI souls, zero-day exploits, ransomware arrests, and data breaches, providing a quick update for security professionals and business leaders.
- Six Zero-Days and Weaponized Gemini AI
This episode covers recent cybersecurity threats, including exploited zero-day vulnerabilities in Microsoft and Apple products, a rapidly weaponized Beyond Trust flaw, and attacks targeting the defense supply chain. It also discusses the d…
- Ivanti Delays vs Three-Day Exploits
This episode of Weekly CYBER NEWS discusses pressing cyber threats such as the exploitation of Ivanti EPMM and n8n, APT28's use of a Microsoft Office zero-day, the Conduent ransomware breach, and a newly discovered state-backed group targe…
- Palo Alto Pivots From Prevention To Resilience
This episode covers major cybersecurity stories including Palo Alto Networks' acquisition of Chronosphere, WordPress plugin vulnerabilities, ransomware threats to financial services, and new security products. It also discusses the World E…
- Mandiant Burns NTLM and APT28 Exploits Office
This episode discusses Mandiant's NTLM findings and APT28's exploitation of Office vulnerabilities. The Daily Executive Cyber Brief provides concise cybersecurity updates for leaders.
- The Security Signal
The Security Signal is a cybersecurity podcast that covers key threats, breaches, and vulnerabilities impacting the digital world. It provides insights on cloud security, APT activity, data breaches, AI risks, and critical infrastructure f…
- Trust Wallet Hack: $7M Stolen in Malicious Browser Extension Attack
A compromised Trust Wallet Chrome extension update resulted in over $7 million in cryptocurrency being stolen. This episode details the supply-chain attack, how seed phrases were compromised, and offers immediate protection advice for cryp…
- Cyber Threat Briefing: Breaches, Attacks & Defense Explained
This episode covers major cyber threats, including a DDoS attack on France's La Poste, a data breach affecting Nissan customers due to a Red Hat vulnerability, and Interpol's successful operation against ransomware scams. It also highlight…
- Inside the Breach: How Modern Phishing and Cloud Attacks Are Beating Defenses
This episode of Inside the Breach examines recent cyber incidents involving platforms like Microsoft 365, WhatsApp, and AWS. It covers phishing, OAuth abuse, and cloud attacks, offering insights for security professionals to enhance defens…
- Ransomware’s New Favorite Target: The Hypervisor Layer Explained
Ransomware attackers are increasingly targeting hypervisors like ESXi and Hyper-V, compromising entire virtual infrastructures. This episode explains attack methods, detection challenges, and essential security strategies including access…
- Trojan Apps on Google Play: Inside the Cellik Android Malware Threat
This episode discusses Cellik, an Android malware-as-a-service that infects apps downloaded from the Google Play Store. It details the malware's capabilities, such as screen streaming and credential theft, and its impact on mobile security.
- Google Shift, React Attack, AI Malware
This episode discusses Google's discontinuation of its Dark Web Report feature, the implications for user data visibility and protection, and the emergence of new cybersecurity threats including Chinese hacking groups, zero-day exploits in…
- AI Security Awareness: Protecting People, Data, and Systems in an AI-Driven Workplace
This training covers identifying common AI security threats such as prompt injection and data leaks. It explains how to protect company data and safely interact with AI tools and assistants in the workplace.
- Agentic AI Gone Rogue: What Cyber Pros Need to Know
This episode discusses AI-driven cyber threats including zero-click attacks and vulnerabilities in software components. It details attacker methods like prompt injection and the risks of agentic AI, advising organizations on protective mea…
- CyberShock Weekly: Breaches, Takedowns & Threats Uncovered
This episode of Weekly CYBER NEWS examines recent cybersecurity incidents, including data breaches at Jaguar Land Rover, Checkout.com, and DoorDash. The discussion also covers Fortinet vulnerabilities, malware threats, police operations, a…
- DanaBot Returns as Hackers Exploit Citrix, Cisco, Triofox, and SAP Flaws
This episode covers the return of DanaBot malware and exploitation of vulnerabilities in Citrix NetScaler, Cisco ISE, and Triofox by threat actors. It also discusses critical security patches from SAP.
- Why Your _Complex_ Passwords Are Weak and the 3-Step Defense Against Digital Attackers
This episode discusses password security, explaining why long passphrases are better than complex ones and how MFA can prevent attacks. It covers the risks of password reuse and offers practical advice for protecting personal and professio…
- CyberFrontline: Breaches, Exploits, and State Actors
This episode of CyberFrontline covers significant global cyber incidents, such as a breach at the U.S. Congressional Budget Office and Cisco’s zero-day vulnerabilities. It also discusses techniques used to hide malware and data leaks affec…
- Zero Click: Inside the New Wave of AI and Cyber Threats
This episode covers recent cybersecurity events including ChatGPT vulnerabilities, advanced Android malware, and WordPress exploits. It discusses AI manipulation via prompt injection, memory poisoning, and the Operation SkyCloak espionage…
- Cargo Jackers, RMM Abuse & a Penn Donor Mega-Breach
This episode of Weekly CYBER NEWS examines the abuse of remote monitoring tools in logistics, a potential data breach at the University of Pennsylvania, and two new Android malware strains, BankBot-YNRK and DeliveryRAT.
- Cyber Frontlines: Global Hacks, Ransomware, and Rising Threats
This episode of Weekly CYBER NEWS examines recent cybersecurity developments, including a ransomware extradition, a surge in NFC malware in Europe, telecom network breaches, and CISA directives regarding VMware vulnerabilities.
- Global Cyber Pulse: Major Breaches and Digital Shifts
This episode covers significant cybersecurity events such as Microsoft's global DNS outage, breaches in Canada's critical infrastructure, phishing attacks targeting LinkedIn executives, and the discovery of malicious npm packages. It offer…
- “Don’t Take the Bait: Spotting Phishing Scams Before They Hook You”
This episode explains how phishing scams operate, including fake HR emails and urgent account warnings. It provides guidance on identifying red flags, securing personal information, and reporting phishing attempts.
- Cyber Threat Watch: The Week in Security Headlines
This episode discusses recent cybersecurity events, including malicious npm packages, CISA warnings, Microsoft's legal issues, AI tools, a Chrome zero-day exploit, and debunked Gmail breach rumors. It analyzes the impact on users and provi…
- Cyber Threats Unpacked: WordPress Attacks, AWS Outages, and Ghost Networks
This episode details various cybersecurity threats including WordPress plugin vulnerabilities, a Windows Server Update Service flaw, an AWS outage caused by DNS failure, and the "YouTube Ghost Network" distributing malware. It also discuss…
- AI, Exploits, and Extortion — The Cyber Frontlines of October 2025
This episode covers significant cybersecurity news from October 2025, including a Figma vulnerability, OpenAI's efforts against state-sponsored hackers, Salesforce's response to a data breach, Google's AI for code security, and the BatShad…
- Redis, Oracle, and GoAnywhere Under Fire: The Exploit Storm of 2025
This episode examines recent critical cybersecurity vulnerabilities affecting Redis, Oracle E-Business Suite, and GoAnywhere servers. It discusses exploitation by ransomware groups and advises organizations on immediate defensive actions.
- Oracle, Discord & Cyber Deception: The Week in Breach
This week's episode of Weekly CYBER NEWS discusses significant cyber events: Oracle is patching a zero-day exploited by Cl0p, Discord experienced a data breach through a third-party provider, and a Chinese cyber group is operating a global…
- Ransom, Red Hat, and Rising Exploits
This episode discusses recent cybersecurity events: Microsoft confirms a GoAnywhere exploit linked to Medusa ransomware, and Red Hat experienced a data breach and extortion attempt by ShinyHunters.
- Cyber Breach Breakdown: From WestJet to Klopatra — What You Missed Last Week
This episode of Weekly CYBER NEWS breaks down recent cyber threats, including a massive data breach at WestJet, the Klopatra Android banking trojan, and data leaks from Adobe Analytics. It also discusses Milesight router smishing attacks,…
- Zero-Days, Rust Crates, and Rogue Firewalls — This Week in Cybersecurity
This episode of Weekly CYBER NEWS covers significant cybersecurity events such as Cisco ASA zero-day exploits with custom malware, North Korea's AkdoorTea backdoor, malicious Rust crates stealing crypto keys, and the Vane Viper ad-fraud ne…
- Ransomware Grounds Europe’s Airports
A ransomware attack on the Collins Aerospace MUSE system led to widespread flight delays and cancellations at European airports from September 19-22, 2025. The episode discusses the disruption's effects on passengers and highlights the vul…
- Billions Stolen, Millions at Risk: This Week in Cybersecurity
This episode covers significant cybersecurity events including sanctions against Southeast Asian scam networks, exploitation of Docker APIs, Microsoft's security patches for zero-day vulnerabilities, a data breach at Plex, and a supply-cha…
- Zero-Days, Data Breaches, and Digital Defense_ Navigating the Relentless Cyber Battlefield
This episode of Weekly CYBER NEWS discusses zero-day vulnerabilities, data breaches, and digital defense tactics. It covers the evolving nature of cyber threats and methods for maintaining security in the current digital environment.
- From Stealthy Spies to Broken Updates: Your Digital Security Unpacked
This episode of Weekly CYBER NEWS covers topics related to digital security, including stealthy spies and software updates. Additional resources are available via provided links.