Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Disaster Risk Management Podcasts
Do you get overwhelmed with insurance policies? Are you interested in learning about the different types of insurance? On the show, RiskProNet starts the conversation about insurance and risk management. RiskProNet is a network of independent insurance agencies who serve individuals and corporations with extensive industry knowledge. Follow the show to get an in-depth look at insurance and risk assessment. If you want to learn more about RiskProNet, visit their website at riskpronet.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Emergency management is a growing discipline as our world has become increasingly more complex, interconnected, and vulnerable to hazards both natural and human caused. The role of the emergency manager, including leaders in public safety, has expanded and become more vital to cities, counties, states, and large organizations, and much of this work can be contained and effectively managed within projects, be they longer term plans, disaster recovery, mitigation measures or short-term emergen ...
…
continue reading
Conversations with Industry Experts, Academicians, and seasoned practitioners on Climate Change and Sustainability including Climate Justice, Climate Finance, Climate Variability, Climate Security, Disaster Risk Management, Circular Economy, Climate Forecasting, ESG Reporting, Air Pollution, Sustainable Forest Management and Food Security
…
continue reading
Whatever life after 50 looks like to you, thinking about money in retirement shouldn’t keep you up at night. We’re all dealing with the big questions about money and aging: How much you can really spend, how to invest your life savings without risking it all in the stock market, and should you sell your home and downsize? Then there’s the biggest unknown: how much health care you’ll need, and whether your savings and insurance is enough to cover the costs. This is personal. These topics may ...
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
On Say Again?! Author and Podcaster Amrita Tripathi deep-dives into some of the big questions of our times with thought leaders and change makers – what makes them tick? How are they viewing the age of ascendant AI? What have they learned about Success and Failure? And how much do they prioritise the good things like Empathy, Wellness…Join us for this and much more on weekly episodes this season.
…
continue reading
The Civil Engineering Podcast provides engineering career advice and success stories specifically for civil engineers. Civil engineers Anthony Fasano, PE and Christian Knutson, PE host the show and showcase civil engineering projects and professional
…
continue reading
Properly practiced, digital transformation should lead to happier, faster, smarter and safer employees and customers. Welcome to Experience Threading: The Podcast where we discuss human-centered, outcome focused digital transformation. If you’ve ever wondered, “How can we make it easier for people to get their work done? How can I move to the cloud, and then stay in the cloud? What’s the best way to handle risk in this work-anywhere world?” we invite you to listen in for the tools, technique ...
…
continue reading
ParlAmericas is the inter-parliamentary institution that promotes parliamentary diplomacy in the inter-American system. Convening the national legislatures from North, Central and South America and the Caribbean, ParlAmericas works to strengthen democratic governance in the hemisphere by enhancing the ability of legislators to fulfill their roles and responsibilities through exchanges of parliamentary best practices and by promoting cooperative political dialogue on regional issues. The Parl ...
…
continue reading
Industrial Info Resources - Industry Today Podcast
…
continue reading
Interested in all things to do with the not for profit sector? So are we, which is why we make these podcasts! Whether you work in the not for profit sector or not, the Prospectus podcasts are here to inspire, engage and excite on a wide range of topics from what challenges leaders are facing to what the next big trend in fundraising might be. Subscribe to our channel to stay up to date with our releases.
…
continue reading
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
…
continue reading

1
Episode 40: From IPS to Disaster Management: Lessons in Risk, Resilience & Real Leadership with Safi Rizvi
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28"Leadership is definitely not about position power. It is a lot about personal power." On the Say Again podcast this week, host Amrita Tripathi speaks to Safi Rizvi, Advisor to the National Disaster Management Authority and a 1989 batch IPS Officer. From understanding disasters management to mitigation strategies when it comes to heat waves, as wel…
…
continue reading

1
U.S. braces for Iranian cyber intrusions.
40:16
40:16
Play later
Play later
Lists
Like
Liked
40:16CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercr…
…
continue reading

1
Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Please enjoy this encore of Career Notes. Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs …
…
continue reading

1
A tale of two botnets. [Research Saturday]
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly …
…
continue reading
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
…
continue reading
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
…
continue reading

1
S17 E07 (VIDEO) You Think MFA is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading

1
S17 E07 You Think MFA Is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
…
continue reading

1
4 Big 401(k) Changes in 2025: What You Need to Know
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53Special Guest: Lisa Gomez Big changes are coming to your 401(k) and workplace retirement plans in 2025 — are you ready for them? In this new episode, the Friends Talk Money team sits down with retirement policy expert Lisa Gomez (former Assistant Secretary of Labor for Employee Benefits Security) to unpack what’s changing and how it could affect yo…
…
continue reading

1
Iran’s digital threat after U.S. strikes.
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
…
continue reading

1
Episode 42: What Sets Winning Startups Apart from the Rest with CEO Abhishek Kumar
3:01
3:01
Play later
Play later
Lists
Like
Liked
3:01On this Say Again Episode, host Amrita Tripathi speaks to Abhishek Kumar, a seasoned startup advisor who shares his candid insights on what separates successful ventures from those that stumble. Tune in as we explore why prioritising user validation over VC approval is key, the pitfalls of chasing funding too early, and why the best thing you can d…
…
continue reading
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
…
continue reading

1
Soberanía y democracia: el rol de los parlamentos en la era de las grandes empresas de tecnología
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34Este episodio fue grabado el 28 de mayo de 2025 durante la vigésima primera Asamblea Plenaria de ParlAmericas y el noveno Encuentro de la Red de Parlamento Abierto, titulado “Legislando para el futuro: la gobernanza anticipatoria en la acción parlamentaria”, organizado por ParlAmericas junto con el Parlamento de la República Oriental del Uruguay. E…
…
continue reading

1
Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading

1
S17 E06 (VIDEO) Disaster Recovery Isn't Optional
45:51
45:51
Play later
Play later
Lists
Like
Liked
45:51Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading

1
Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading

1
Innovating Demolition and Environmental Services to Build a Stronger Workforce – Ep 291
25:41
25:41
Play later
Play later
Lists
Like
Liked
25:41In this episode, I talk with Jennifer Todd, MLS, president of LMS General Contractors and founder of A Greener Tomorrow, about demolition and environmental services, specifically how innovation and workforce development are transforming these sectors into more sustainable, inclusive, and opportunity-rich fields. Engineering Quotes: Here Are Some of…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading

1
Episode 41 | 9 Years of Mental Health Advocacy: How The Health Collective Was Built
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34You have to pace yourself. In this special solo episode of Say Again, host Amrita Tripathi reflects on the nine-year journey of The Health Collective, a pioneering platform that has reshaped mental health conversations in India. From its humble beginnings to becoming a trusted resource, Amrita shares behind-the-scenes insights, lessons learned, and…
…
continue reading

1
Darknet drug marketplace closed for business.
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
…
continue reading

1
Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
…
continue reading
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
…
continue reading
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
…
continue reading
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
…
continue reading

1
S17 E05 (VIDEO) Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
S17 E05 Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
Ghost students “haunting” online colleges.
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
…
continue reading
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bu…
…
continue reading

1
White House reboots cybersecurity priorities.
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM hav…
…
continue reading

1
Ell Marquez: It's okay to be new. [Linux] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fe…
…
continue reading

1
A new stealer hiding behind AI hype. [Research Saturday]
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users in…
…
continue reading
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities.…
…
continue reading

1
China’s largest data leak exposes billions.
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomwa…
…
continue reading

1
Appetite for tracking: A feast on private data.
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber th…
…
continue reading

1
How to Manage Construction Project Risks to Survive Economic Shifts – Ep 290
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54In this episode, I talk with Josh Levy, co-founder and CEO of Document Crunch, about how ongoing economic shifts are disrupting the construction industry and why managing construction project risks with contract clauses and technology is essential. ***The video version of this episode can be viewed here.*** Engineering Quotes: Here Are Some of the …
…
continue reading
Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to stren…
…
continue reading

1
Episode 39: Jaipur Lit Festival Producer Sanjoy Roy: How Arts Matter in the Age of AI
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Much of the Jaipur Literature festival started as an accident, JLF Producer and Teamwork Arts Managing Director Sanjoy Roy tells Say Again podcast host Amrita Tripathi in this week's episode. As a reporter who used to cover the festival and a writer whose first novel was commissioned at JLF, Tripathi asks Roy to share more behind the scenes details…
…
continue reading
An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three active…
…
continue reading

1
What’s in Your 401(k)? It’s Time to Look.
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04If you’re like a lot of people nearing retirement, your 401(k) or 403(b) is probably the biggest part of your savings. But do you actually know how it’s invested—or how much risk in stocks you’re taking on without realizing it? In this episode of Friends Talk Money, we’re going to look more closely. Ron Surz, a long-time retirement investing expert…
…
continue reading

1
4 Generations, 1 Workforce: Solving the Insurance Talent Gap with Luis Rivera
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15Luis Rivera of Solutions 21 joins host Chip Arenchild to explore the real challenge facing independent insurance agencies: developing the next generation of leaders. From military insights to succession planning analogies, this episode uncovers how brokerages can address generational shifts, preserve institutional knowledge, and build leadership at…
…
continue reading

1
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to M…
…
continue reading

1
Triofox and the key to disaster. [Research Saturday]
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
…
continue reading
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
…
continue reading

1
When "out of the box" becomes "out of control."
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
…
continue reading
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims…
…
continue reading