Bra podd
Sveriges mest populära poddar
Topplistor
Verkliga brott
Historia
Musik
Religion och spiritualitet
Samhälle och kultur
Vetenskap
Barn och familj
Fritid
Hälsa och motion
Komedi
Konst och kultur
Näringsliv
Nyheter och politik
Poddtoppen
Skönlitteratur
Sport och fritid
Stat och kommun
Teknik
Tv och film
Utbildning
Kategorier
Konst
(1963)
Religion och spiritualitet
(1902)
Utbildning
(1669)
Samhälle och kultur
(1582)
Fritid
(1472)
Teknologi
(1341)
Musik
(1333)
Vetenskap
(1214)
TV och film
(1223)
Nyheter
(1095)
Historia
(1019)
Barn och familj
(943)
Hälsa och motion
(925)
Näringsliv
(952)
Skönlitteratur
(867)
Kristendom
(734)
Böcker
(649)
Komedi
(610)
Verkliga brott
(514)
Sport
(542)
Andlighet
(528)
Självhjälp
(508)
Stat och kommun
(448)
Hobbies
(398)
Sällskapsspel
(385)
Drama
(334)
Musikkommentarer
(325)
Mental hälsa
(319)
Föräldraskap
(307)
Musikintervjuer
(301)
Spel
(293)
Politik
(281)
Dokumentär
(260)
Språkkurs
(241)
Samhällsvetenskap
(216)
Science fiction
(214)
Entreprenörskap
(205)
Filmrecensioner
(204)
Dans och teater
(197)
Mat
(189)
Tekniknyheter
(190)
Islam
(185)
Musikhistoria
(184)
TV-recensioner
(179)
Investering
(176)
Mode och skönhet
(175)
Efterprogram
(172)
Berättelser för barn
(176)
Så gör man
(174)
Visuell konst
(170)
Naturvetenskap
(156)
Relationer
(152)
Design
(152)
Personliga dagböcker
(147)
Nyhetskommentarer
(130)
Natur
(129)
Life Science
(126)
Filmhistoria
(125)
Alternativ hälsa
(120)
Hus och trädgård
(117)
Fordon
(114)
Medicin
(114)
Filosofi
(116)
Fotboll
(115)
Utbildning för barn
(115)
Kurser
(114)
Karriär
(109)
Komedifiktion
(106)
Ledarskap
(106)
Djur
(96)
Underhållningsnyheter
(93)
Religion
(82)
Filmintervjuer
(77)
Affärsnyheter
(74)
Dagliga nyheter
(72)
Komediintervjuer
(72)
Hantverk
(71)
Motion
(66)
Marknadsföring
(57)
Judendom
(57)
Näringslära
(57)
Sexualitet
(51)
Buddhism
(52)
Sportnyheter
(52)
Geovetenskap
(48)
Hockey
(47)
Platser och resor
(42)
Flyg
(38)
Fysik
(36)
Amerikansk fotboll
(34)
Ideell
(34)
Astronomi
(33)
Löpning
(31)
Improvisering
(30)
Animering och manga
(29)
Vildmarken
(24)
Golf
(12)
Hinduism
(16)
Kemi
(16)
Matematik
(16)
Basket
(10)
Fantasysporter
(10)
Ståupp
(8)
Tennis
(8)
Baseball
(3)
Brottning
(2)
Cricket
(2)
Rugby
Simning
Start
/
Daily Security Review
/
Ai generated video of youtubes ceo used in phishing attack
Daily Security Review
AI-Generated Video of YouTube's CEO Used In Phishing Attack
18 min • 5 mars 2025
Spela avsnitt
Spela avsnitt
Senaste avsnitt
Play
Pause
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
20 augusti | 42 min
Play
Pause
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
19 augusti | 48 min
Play
Pause
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
19 augusti | 65 min
Play
Pause
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
19 augusti | 51 min
Play
Pause
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
19 augusti | 45 min
Play
Pause
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
19 augusti | 35 min
Play
Pause
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
18 augusti | 26 min
Play
Pause
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
18 augusti | 26 min
Play
Pause
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
18 augusti | 34 min
Play
Pause
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
18 augusti | 37 min
Play
Pause
U.S. Sanctions Grinex, the Russian Crypto Exchange Born from Garantex’s Ashes
16 augusti | 38 min
Play
Pause
Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day
15 augusti | 11 min
Play
Pause
Norwegian Authorities Blame Pro-Russian Hackers for Critical Infrastructure Breach
15 augusti | 16 min
Play
Pause
MadeYouReset: New HTTP/2 Flaw Could Unleash Massive DDoS Storms
15 augusti | 41 min
Play
Pause
Cybersecurity Budgets Hit Historic Slowdown as Global Tensions Mount
15 augusti | 28 min
Play
Pause
CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain
14 augusti | 45 min
Play
Pause
Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack
14 augusti | 48 min
Play
Pause
Charon Ransomware Targets Middle East Government and Aviation Sectors
13 augusti | 25 min
Play
Pause
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
13 augusti | 33 min
Play
Pause
RansomHub Hits Michigan’s Manpower — Data Breach Exposes 140,000 Individuals
13 augusti | 17 min
Play
Pause
Security Firms Warn GPT-5 Is Wide Open to Jailbreaks and Prompt Attacks
12 augusti | 44 min
Play
Pause
Germany’s Top Court Limits Police Spyware to Serious Crimes Only
11 augusti | 39 min
Play
Pause
BadCam: Lenovo Webcam Flaw Turns Everyday Cameras into Remote BadUSB Attack Tools
11 augusti | 53 min
Play
Pause
Free Wi-Fi Loophole Lets Hackers Breach Smart Bus Control Systems
11 augusti | 47 min
Play
Pause
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
8 augusti | 48 min
Play
Pause
Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
7 augusti | 37 min
Play
Pause
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
7 augusti | 37 min
Play
Pause
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
7 augusti | 57 min
Play
Pause
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
7 augusti | 47 min
Play
Pause
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
6 augusti | 32 min
Play
Pause
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
6 augusti | 53 min
Play
Pause
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
6 augusti | 35 min
Play
Pause
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
6 augusti | 31 min
Play
Pause
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
5 augusti | 67 min
Play
Pause
Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats
5 augusti | 56 min
Play
Pause
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
5 augusti | 68 min
Play
Pause
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
5 augusti | 63 min
Play
Pause
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
4 augusti | 44 min
Play
Pause
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
4 augusti | 86 min
Play
Pause
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
4 augusti | 40 min
Play
Pause
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
31 juli | 77 min
Play
Pause
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
31 juli | 37 min
Play
Pause
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
31 juli | 54 min
Play
Pause
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
31 juli | 62 min
Play
Pause
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
30 juli | 17 min
Play
Pause
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
30 juli | 97 min
Play
Pause
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
30 juli | 42 min
Play
Pause
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
30 juli | 37 min
Play
Pause
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
29 juli | 24 min
Play
Pause
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
29 juli | 77 min
Play
Pause
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
29 juli | 83 min
Play
Pause
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
29 juli | 24 min
Play
Pause
Neferpitou Claims Cyberattack on French Naval Defense Giant
29 juli | 44 min
Play
Pause
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
28 juli | 37 min
Play
Pause
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
28 juli | 41 min
Play
Pause
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
28 juli | 56 min
Play
Pause
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
25 juli | 44 min
Play
Pause
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
25 juli | 39 min
Play
Pause
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
25 juli | 34 min
Play
Pause
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
25 juli | 31 min
Play
Pause
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
24 juli | 75 min
Play
Pause
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
24 juli | 42 min
Play
Pause
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
24 juli | 45 min
Play
Pause
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
24 juli | 36 min
Play
Pause
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
23 juli | 48 min
Play
Pause
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
23 juli | 26 min
Play
Pause
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
23 juli | 44 min
Play
Pause
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
23 juli | 38 min
Play
Pause
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
22 juli | 58 min
Play
Pause
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22 juli | 22 min
Play
Pause
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
22 juli | 24 min
Play
Pause
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
22 juli | 59 min
Play
Pause
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
22 juli | 41 min
Play
Pause
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
21 juli | 53 min
Play
Pause
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
21 juli | 63 min
Play
Pause
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
21 juli | 50 min
Play
Pause
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
17 juli | 24 min
Play
Pause
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
17 juli | 21 min
Play
Pause
Operation Eastwood: Inside the Takedown of NoName057(16)
17 juli | 21 min
Play
Pause
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
17 juli | 22 min
Play
Pause
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
16 juli | 22 min
Play
Pause
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
16 juli | 24 min
Play
Pause
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
16 juli | 18 min
Play
Pause
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
16 juli | 22 min
Play
Pause
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
15 juli | 81 min
Play
Pause
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
15 juli | 41 min
Play
Pause
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
15 juli | 49 min
Play
Pause
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
15 juli | 32 min
Play
Pause
TikTok, China, and the EU: The Battle Over Data Sovereignty
11 juli | 58 min
Play
Pause
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
11 juli | 33 min
Play
Pause
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
11 juli | 28 min
Play
Pause
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
11 juli | 17 min
Play
Pause
Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
10 juli | 63 min
Play
Pause
Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat
9 juli | 66 min
Play
Pause
The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats
8 juli | 45 min
Play
Pause
CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices
8 juli | 62 min
Play
Pause
SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
8 juli | 62 min
Play
Pause
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
7 juli | 51 min
Play
Pause
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
7 juli | 60 min
Play
Pause
The Illusion of Shutdowns: What Hunters International's Closure Really Means
7 juli | 43 min
Play
Pause
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
7 juli | 41 min
Play
Pause
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
4 juli | 33 min
Play
Pause
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
4 juli | 17 min
Play
Pause
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
4 juli | 42 min
Play
Pause
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
3 juli | 43 min
Play
Pause
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
3 juli | 56 min
Play
Pause
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
3 juli | 51 min
Play
Pause
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
3 juli | 68 min
Play
Pause
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
2 juli | 46 min
Play
Pause
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
2 juli | 20 min
Play
Pause
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
2 juli | 44 min
Play
Pause
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
2 juli | 25 min
Play
Pause
Berlin Regulator Targets DeepSeek AI Over Data Transfers to China
1 juli | 44 min
Play
Pause
CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks
1 juli | 57 min
Play
Pause
Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion
1 juli | 17 min
Play
Pause
Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks
1 juli | 54 min
Play
Pause
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
30 juni | 106 min
Play
Pause
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
30 juni | 38 min
Play
Pause
Why Canada Banned Hikvision: National Security vs. Geopolitics
30 juni | 52 min
Play
Pause
Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation
30 juni | 44 min
Play
Pause
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
27 juni | 55 min
Play
Pause
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
27 juni | 42 min
Play
Pause
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
27 juni | 47 min
Play
Pause
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass
27 juni | 19 min
Play
Pause
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS
26 juni | 78 min
Play
Pause
Central Kentucky Radiology’s 2024 Data Breach Affects 167,000
26 juni | 52 min
Play
Pause
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data
26 juni | 70 min
Play
Pause
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
26 juni | 55 min
Play
Pause
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App
25 juni | 46 min
Play
Pause
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients
25 juni | 45 min
Play
Pause
Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike
25 juni | 41 min
Play
Pause
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security
25 juni | 84 min
Play
Pause
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach
24 juni | 45 min
Play
Pause
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
24 juni | 57 min
Play
Pause
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
24 juni | 44 min
Play
Pause
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
24 juni | 33 min
Play
Pause
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
23 juni | 44 min
Play
Pause
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
23 juni | 57 min
Play
Pause
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
23 juni | 54 min
Play
Pause
The Nucor Cyberattack: How Ransomware Threatens American Steel
23 juni | 59 min
Play
Pause
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
22 juni | 62 min
Play
Pause
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
22 juni | 48 min
Play
Pause
Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer
21 juni | 42 min
Play
Pause
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
21 juni | 54 min
Play
Pause
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
20 juni | 55 min
Play
Pause
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
20 juni | 46 min
Play
Pause
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
20 juni | 65 min
Play
Pause
Oxford City Council Breach Exposes 21 Years of Data
20 juni | 36 min
Play
Pause
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
19 juni | 38 min
Play
Pause
GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain
19 juni | 35 min
Play
Pause
Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk
19 juni | 54 min
Play
Pause
Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme
19 juni | 51 min
Play
Pause
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
17 juni | 55 min
Play
Pause
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
17 juni | 67 min
Play
Pause
DragonForce Ransomware: The Evolving Threat to Healthcare Data
17 juni | 39 min
Play
Pause
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
17 juni | 62 min
Play
Pause
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
16 juni | 64 min
Play
Pause
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
16 juni | 61 min
Play
Pause
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
16 juni | 44 min
Play
Pause
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
16 juni | 26 min
Play
Pause
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
15 juni | 50 min
Play
Pause
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
15 juni | 71 min
Play
Pause
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
14 juni | 52 min
Play
Pause
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
14 juni | 35 min
Play
Pause
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
13 juni | 32 min
Play
Pause
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
13 juni | 12 min
Play
Pause
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
13 juni | 15 min
Play
Pause
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
11 juni | 35 min
Play
Pause
TxDOT Data Leak: 423,391 Texans Exposed
11 juni | 45 min
Play
Pause
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
11 juni | 44 min
Play
Pause
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
10 juni | 41 min
Play
Pause
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
10 juni | 44 min
Play
Pause
UNFI Breach: How One Cyberattack Shook the North American Food Supply
10 juni | 37 min
Play
Pause
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
7 juni | 40 min
Play
Pause
ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap
5 juni | 47 min
Play
Pause
Exposed and Extorted: The ViLE Hackers and the Legal Gaps Enabling Doxing
5 juni | 48 min
Play
Pause
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
4 juni | 28 min
Play
Pause
Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law
4 juni | 62 min
Play
Pause
$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market
4 juni | 32 min
Play
Pause
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
3 juni | 55 min
Play
Pause
CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized
3 juni | 96 min
Play
Pause
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
3 juni | 67 min
Play
Pause
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
2 juni | 16 min
Play
Pause
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How
2 juni | 14 min
Play
Pause
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
2 juni | 18 min
Play
Pause
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
30 maj | 15 min
Play
Pause
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
30 maj | 14 min
Play
Pause
Unbound Raises $4M to Secure Generative AI in the Enterprise
30 maj | 20 min
Play
Pause
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push
29 maj | 16 min
Play
Pause
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
29 maj | 19 min
Play
Pause
The LexisNexis Breach: 364,000 Records Exposed via GitHub
29 maj | 17 min
Play
Pause
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions
28 maj | 13 min
Play
Pause
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations
28 maj | 14 min
Play
Pause
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726
28 maj | 17 min
Play
Pause
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
27 maj | 14 min
Play
Pause
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected
27 maj | 12 min
Play
Pause
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data
27 maj | 23 min
Play
Pause
The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield
26 maj | 29 min
Play
Pause
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting
26 maj | 29 min
Play
Pause
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks
26 maj | 15 min
Play
Pause
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
23 maj | 26 min
Play
Pause
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
23 maj | 11 min
Play
Pause
From TikTok to Total Compromise: The Rise of Social Media Infostealers
23 maj | 19 min
Play
Pause
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
22 maj | 24 min
Play
Pause
Deepfake Threats, Mobile Biometrics, and the Future of Trust
22 maj | 17 min
Play
Pause
119,000 ICS Devices Exposed: The Internet’s Hidden Infrastructure Risk
22 maj | 20 min
Play
Pause
Arla Foods Upahl Site Hit by Cyberattack—What It Means for Food Supply Chains
20 maj | 18 min
Play
Pause
Bypassing Antivirus: What Defendnot Reveals About the Weak Spots in Windows Security
20 maj | 20 min
Play
Pause
BreachRx Raises $15M to Automate the Chaos of Incident Response
20 maj | 12 min
Play
Pause
110,000+ Records Compromised: The NRS Cybersecurity Failure
19 maj | 15 min
Play
Pause
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
19 maj | 12 min
Play
Pause
483,000 Patients at Risk: Catholic Health Vendor Breach Exposes Critical Data
19 maj | 12 min
Play
Pause
Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover
16 maj | 9 min
Play
Pause
Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands
16 maj | 12 min
Play
Pause
Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security
16 maj | 10 min
Play
Pause
Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500
14 maj | 23 min
Play
Pause
Checkout Chaos: Inside the £3.5 Million-a-Day M&S Cyber-Shutdown
14 maj | 16 min
Play
Pause
Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast
14 maj | 10 min
Play
Pause
Texas vs Google: The $1.4 Billion Wake-Up Call for Data Privacy Violations
13 maj | 11 min
Play
Pause
Marbled Dust's Zero-Day Exploit: Unveiling a Türkiye-linked Espionage Campaign Against Kurdish Forces
13 maj | 10 min
Play
Pause
TeleMessage Exploit: Inside the Messaging Flaw That Hit Coinbase and CBP
13 maj | 14 min
Play
Pause
Backdoored by ‘Cheap’ AI: How Fake npm Packages Compromised Cursor IDE
12 maj | 25 min
Play
Pause
160,000 Victims Later: The Aspire USA Breach Under Valsoft’s Watch
12 maj | 9 min
Play
Pause
rand-user-agent: The NPM Package That Opened a Backdoor
12 maj | 15 min
Play
Pause
PipeMagic, Procdump, and Privilege Escalation: Tracking the Windows CLFS Exploit Chain
8 maj | 19 min
Play
Pause
Pegasus Spyware, WhatsApp v. NSO Group, and the Global Battle for Data Privacy
8 maj | 21 min
Play
Pause
How CodeAnt AI is Automating Code Reviews for 50+ Dev Teams
8 maj | 18 min
Play
Pause
The Langflow Breach: How a Popular AI Tool Opened the Door to Hackers
7 maj | 13 min
Play
Pause
Mirai Reloaded: Why CVE-2024-7399 Still Haunts Samsung Servers
7 maj | 14 min
Play
Pause
CVE-2025-31324: A Critical SAP Zero-Day in Active Exploitation
7 maj | 12 min
Play
Pause
Another Day, Another Commvault Zero-Day: RCE, Path Traversal, and KEV Inclusions
6 maj | 12 min
Play
Pause
Kelly Benefits Breach: What 413,000 Exposed Records Teach Us About Cybersecurity
6 maj | 14 min
Play
Pause
$491M Budget Cut: The White House Move That Could Reshape CISA
6 maj | 19 min
Play
Pause
TikTok Fined €530M: GDPR Breach Over Data Transfers to China
5 maj | 21 min
Play
Pause
Endor Labs Raises $93M to Cut AppSec Noise and Secure the Software Supply Chain
5 maj | 12 min
Play
Pause
CVE-2025-3928: How One Vulnerability Breached Commvault’s Azure Stack
5 maj | 14 min
Play
Pause
Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure
2 maj | 12 min
Play
Pause
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
2 maj | 11 min
Play
Pause
OpenEoX and the Future of End-of-Life Standardization in IT
2 maj | 12 min
Play
Pause
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
30 april | 25 min
Play
Pause
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
30 april | 13 min
Play
Pause
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
30 april | 14 min
Play
Pause
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
29 april | 13 min
Play
Pause
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
29 april | 9 min
Play
Pause
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
29 april | 17 min
Play
Pause
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
28 april | 12 min
Play
Pause
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
28 april | 15 min
Play
Pause
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
28 april | 13 min
Play
Pause
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
25 april | 13 min
Play
Pause
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
25 april | 14 min
Play
Pause
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
25 april | 12 min
Play
Pause
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
24 april | 9 min
Play
Pause
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
24 april | 9 min
Play
Pause
$16.6 Billion Lost: The True Cost of Cybercrime in America
24 april | 9 min
Play
Pause
The Second Scam: FBI Warns of IC3 Impersonators Targeting Fraud Victims
22 april | 8 min
Play
Pause
Inside the Breach: What Recent Cyberattacks Reveal About Your Data Security
16 april | 9 min
Play
Pause
Inside Security News : GitHub Supply Chain Attacks, Ransomware Defense, and Cloud Security
15 april | 18 min
Play
Pause
Next.js Security Vulnerability: Middleware Bypass (CVE-2025-29927)
14 april | 17 min
Play
Pause
Cyberattack Roundup: Lessons from the Latest Breaches & Ransomware Strikes
26 mars | 5 min
Play
Pause
Mastering Incident Response: A Guide to Building a Resilient Plan
26 mars | 19 min
Play
Pause
No More Warnings? The Risks of Losing CIPAC’s Cyber Threat Coordination
20 mars | 16 min
Play
Pause
517,000 Victims: How a Ransomware Gang Targeted Pennsylvania’s Largest Educators’ Union
20 mars | 12 min
Play
Pause
DollyWay: The 8-Year WordPress Malware Campaign Infecting 20,000 Sites
20 mars | 14 min
Play
Pause
MegaRAC CVE-2024-54085 Vulnerability: Critical BMC Flaw Threatening Data Centers
19 mars | 11 min
Play
Pause
Microsoft Windows March Update Wipes Out Copilot
19 mars | 9 min
Play
Pause
Hackers Flip the Script: How a Fake Coinbase Email Could Empty Your Wallet
18 mars | 20 min
Play
Pause
Brute-Force on Autopilot: Black Basta’s 'BRUTED' VPN Tool for Ransomware Expansion
17 mars | 13 min
Play
Pause
GitHub Action Hijacked: The Supply Chain Attack That Exposed 23,000 Repositories
17 mars | 14 min
Play
Pause
Brave Browser Review 🎯 How Safe is This Web Browser? (2025)
17 mars | 27 min
Play
Pause
Bridging the Gap: Developers vs. Security in the Cloud
14 mars | 20 min
Play
Pause
Exploring the Dark Web: Unveiling the Hidden Internet 🌐💻
13 mars | 11 min
Play
Pause
Security vulnerabilities: Key Steps for secure Workflows
12 mars | 15 min
Play
Pause
The Hidden Threat of Wi-Fi Tracking: How Your Devices Reveal Your Location
12 mars | 10 min
Play
Pause
Zero Trust & Data Security: The Future of Protecting Government Information
11 mars | 6 min
Play
Pause
Japanese telco NTT Communications hacked hackers accessed details of almost 18,000 organizations
10 mars | 6 min
Play
Pause
1 Million Devices Hit: Inside the Massive Malvertising Campaign
7 mars | 25 min
Play
Pause
Inside the $635K Taylor Swift Ticket Heist: Cybercrime, Loopholes, and Insider Threats
7 mars | 13 min
Play
Pause
Silk Typhoon Strikes: From Direct Breaches to Stealthy Supply Chain Attacks
6 mars | 19 min
Play
Pause
Tracking Stingrays: How Rayhunter Shields Your Mobile Privacy
6 mars | 12 min
Play
Pause
AI-Generated Video of YouTube's CEO Used In Phishing Attack
5 mars | 18 min
Play
Pause
BackConnect, Microsoft Teams, & Social Engineering—How Ransomware is Adapting
5 mars | 13 min
Play
Pause
OnlyFans Cyberattacks: Fake CAPTCHAs and Malware Distribution Threaten Users
4 mars | 13 min
Play
Pause
9 Million Downloads, Now Banned: VSCode Extensions Under Fire
27 februari | 17 min
Play
Pause
Bybit's $1.5 Billion Ether Theft: Analysis, investigation and finds
26 februari | 12 min
Play
Pause
The Cost of a Data Breach: How to Stay Secure in 2025
19 februari | 16 min
Play
Pause
Hacking Nations: How Cybercrime is Becoming a National Security Crisis
19 februari | 12 min
Play
Pause
Russia vs. Ransomware: A Game of Cybersecurity Chess
19 februari | 12 min
Play
Pause
Botnets, Proxies, and Brute Force: How 2.8 Million IPs Target VPNs and Firewalls
12 februari | 17 min
Play
Pause
Inside the Billion-Dollar Heist: Carbonak’s Audacious Cybercrime Saga
11 februari | 14 min
Play
Pause
Modern Bank Heists: Cybercrime, Zero-Day Exploits & The Future of Financial Security
10 februari | 13 min
Play
Pause
The Ethereum Vulnerability That Almost Shook the Network
7 februari | 13 min
Play
Pause
The Wireless Pen Test Guide: Are Your Wi-Fi Networks Really Secure?
6 februari | 18 min
Play
Pause
190 Million Breached: Inside the Cyber War on Healthcare
6 februari | 25 min
Ladda fler
Minimera
00:00
-00:00
15
Tillbaka 15 sekunder
Play
Pause
15
Framåt 15 sekunder
15
Tillbaka 15 sekunder
Play
Pause
15
Framåt 15 sekunder
Expandera spelare
Stäng spelare
00:00
-00:00