

Cyber Security Headlines
CISO Series
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Episodes
Mentioned books

18 snips
Jun 4, 2025 • 8min
Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass
Meta and Yandex face backlash for compromising Android users' web browsing anonymity. Meanwhile, Acreed malware rises as a leading threat, indicating shifting malware trends. In another crucial update, Hewlett Packard Enterprise warns of a significant authentication bypass vulnerability. These developments highlight the ongoing challenges in cybersecurity and the evolving tactics of cybercriminals.

12 snips
Jun 3, 2025 • 8min
MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details
Microsoft and CrowdStrike are joining forces to enhance threat attribution in cybersecurity. Qualcomm has reported active exploitation of vulnerabilities in its Adreno GPUs. Meanwhile, budget cuts affecting CISA raise concerns about future cyber defenses. On the horizon, the BlackOwl hacking group is independently targeting Russian firms, while critical security flaws in certain apps come to light. A new crypto-jacking campaign is posing risks to DevOps web servers, highlighting the important role of AI in empowering cybersecurity analysts.

8 snips
Jun 2, 2025 • 8min
Cisco IOS XE exploit, Senators’ CSRB request, Australia ransomware law
A severe vulnerability in Cisco IOS XE has been publicly exposed, raising alarms in the cybersecurity community. Meanwhile, U.S. Senators are advocating for the return of the Cyber Safety Review Board to tackle pressing threats, including the Salt Typhoon investigation. In Australia, new laws now require ransomware victims to disclose extortion payments, placing greater accountability on organizations. The conversation also touches on other critical exploits, including issues with vBulletin software and warnings about potential nation-state cyberattacks.

9 snips
May 30, 2025 • 26min
Week in Review: Chrome password replacer, Luna Moth exploits, ChatGPT declines shutdown command
Steve Knight, former CISO at Hyundai Capital America, shares his expert insights on the latest in cybersecurity. He discusses a new Chrome feature for easy password updates after breaches and the risks of AI, including ChatGPT's refusal to follow shutdown commands. The conversation dives into the serious effects of ransomware on healthcare, highlighting the need for better security collaboration and addressing vulnerabilities tied to third-party services and social engineering tactics. Knight emphasizes the importance of transparency in AI development.

8 snips
May 30, 2025 • 7min
Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat
Microsoft warns that Windows 11 may not start after a recent update, leading to user frustrations. Meanwhile, the Victoria's Secret website faced a cybersecurity breach, causing it to go offline. Additionally, security experts raise alarms over billions of stolen cookies circulating on the dark web, jeopardizing user privacy and security. The podcast dives into these critical cyber threats and discusses the implications for businesses and individuals alike.

18 snips
May 29, 2025 • 8min
Microsoft updates Update, LexisNexis leak, cyber insurance premiums
Microsoft reveals exciting updates to improve cybersecurity protocols while addressing a major data breach impacting 364,000 individuals from LexisNexis. The podcast dives into the rising trend of cyber insurance premiums expected to double, reflecting growing concerns in the industry. Additionally, the emergence of the Dark Partners threat group showcases the evolving risks to cryptocurrency users, alongside alarming changes in how cybersecurity professionals present their qualifications.

18 snips
May 28, 2025 • 7min
MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack
MathWorks has confirmed they suffered a ransomware attack, raising concerns about cybersecurity resilience. Adidas faces a data breach linked to a compromised customer service provider. Dutch intelligence warns that Russian hackers have stolen sensitive police data in a major cyberattack. The episode also discusses the implications of GitHub's vulnerabilities and the evolving threat landscape, including issues related to quantum computing and encryption.

6 snips
May 27, 2025 • 7min
Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command
Delve into the alarming world of cybersecurity as malicious npm packages are found stealing user data. A ransomware attack on Nova Scotia Power raises red flags about corporate security. Meanwhile, disturbing research reveals that ChatGPT can bypass shutdown commands, sparking debates on AI autonomy. The discussion also highlights the need for organizations to tighten their defenses after a significant data breach exposed 184 million credentials. Stay informed about the evolving threats in the digital landscape!

8 snips
May 26, 2025 • 9min
CISA’s Commvault warning, updated Killnet returns, fake VPN malware
CISA has alerted Commvault clients about a concerning campaign that targets cloud applications. The Russian hacker group Killnet makes a comeback with a revised strategy. Additionally, fake VPNs and browser installers are now being used to deploy Winos 4.0 malware, highlighting the evolving threat landscape. Tune in to discover how these developments impact cybersecurity.

7 snips
May 23, 2025 • 25min
Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
In this engaging conversation, George Finney, CISO at The University of Texas System and author focused on cybersecurity habits, tackles pressing issues in the field. He discusses the need for a zero trust approach, particularly in the wake of malware evasion tactics. The episode sheds light on vulnerabilities in Chinese-made power inverters that threaten national security. Furthermore, Finney emphasizes the integration of cybersecurity in HR practices and the importance of enhancing cybersecurity training to combat insider threats and other evolving risks.