<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/bmc-daily-cyber-news" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>BMC Daily Cyber News</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/bmc-daily-cyber-news</itunes:new-feed-url>
    <description>The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.</description>
    <copyright>2025 BareMetalCyber.com</copyright>
    <podcast:guid>3620e13c-e0ca-5640-840a-2a3805dddeb7</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="c424cfac-04e8-5c02-8ac7-4df13280735d" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cisa-prepcast"/>
      <podcast:remoteItem feedGuid="95828547-bd9f-5d7b-91db-b53509a3caf0" feedUrl="https://feeds.transistor.fm/certified-itil-foundation-v4"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="506cc512-6361-5285-8cdf-7de14a0f5a64" feedUrl="https://feeds.transistor.fm/certified-aws-certified-cloud-practitioner"/>
      <podcast:remoteItem feedGuid="1e81ed4d-b3a7-5035-b12a-5171bdd497b8" feedUrl="https://feeds.transistor.fm/certified-the-crisc-prepcast"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="0a94ff8f-95c6-5b31-9262-c3761e5e5fc3" feedUrl="https://feeds.transistor.fm/certified-comptia-network"/>
    </podcast:podroll>
    <podcast:locked owner="baremetalcyber@outlook.com">no</podcast:locked>
    <itunes:applepodcastsverify>d1771c60-9882-11f0-9545-bb7aa322765e</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Mon, 13 Oct 2025 23:21:24 -0500" url="https://media.transistor.fm/aa0cfcc0/e7ba0df8.mp3" length="694039" type="audio/mpeg">Trailer</podcast:trailer>
    <podcast:trailer pubdate="Mon, 22 Sep 2025 13:28:27 -0500" url="https://media.transistor.fm/ccb15072/47bfbf79.mp3" length="988700" type="audio/mpeg">Welcome to the Daily Cyber News Podcast!</podcast:trailer>
    <language>en</language>
    <pubDate>Thu, 04 Dec 2025 00:23:49 -0600</pubDate>
    <lastBuildDate>Tue, 14 Apr 2026 00:05:50 -0500</lastBuildDate>
    <link>https://baremetalcyber.com/daily-cyber-news</link>
    <image>
      <url>https://img.transistorcdn.com/Nqy-7I6vREbCuMP77fV3l-S4BuLVWufryKpUGZCDQAo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNzA5/NzI0YjZhNmM2MjYy/ZGJmNjMzNWJlMGQ0/ZjJhZS5wbmc.jpg</url>
      <title>BMC Daily Cyber News</title>
      <link>https://baremetalcyber.com/daily-cyber-news</link>
    </image>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/Nqy-7I6vREbCuMP77fV3l-S4BuLVWufryKpUGZCDQAo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNzA5/NzI0YjZhNmM2MjYy/ZGJmNjMzNWJlMGQ0/ZjJhZS5wbmc.jpg"/>
    <itunes:summary>The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.</itunes:summary>
    <itunes:subtitle>The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day.</itunes:subtitle>
    <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
    <itunes:owner>
      <itunes:name>Dr Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Daily Cyber News – December 3rd, 2025</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Daily Cyber News – December 3rd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd761c06-7ad3-4c2c-bd9a-bcbdec7ea4d0</guid>
      <link>https://share.transistor.fm/s/ab92098b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk.</p><p>Listeners will hear about smart home voyeurism at scale, code supply-chain attacks that leak hundreds of thousands of developer secrets, and a retail breach that exposed data on tens of millions of shoppers. The brief also covers Android zero-day fixes, malicious development extensions, and claims of a major hardware vendor breach that could put firmware and camera code into criminals’ hands. Finally, we explore how artificial intelligence adoption, new authentication bypass kits, and crime-as-a-service marketplaces are reshaping what “baseline” cyber risk looks like for teams of every size, with daily coverage available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk.</p><p>Listeners will hear about smart home voyeurism at scale, code supply-chain attacks that leak hundreds of thousands of developer secrets, and a retail breach that exposed data on tens of millions of shoppers. The brief also covers Android zero-day fixes, malicious development extensions, and claims of a major hardware vendor breach that could put firmware and camera code into criminals’ hands. Finally, we explore how artificial intelligence adoption, new authentication bypass kits, and crime-as-a-service marketplaces are reshaping what “baseline” cyber risk looks like for teams of every size, with daily coverage available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Dec 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ab92098b/aa2b0d67.mp3" length="36145487" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>903</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk.</p><p>Listeners will hear about smart home voyeurism at scale, code supply-chain attacks that leak hundreds of thousands of developer secrets, and a retail breach that exposed data on tens of millions of shoppers. The brief also covers Android zero-day fixes, malicious development extensions, and claims of a major hardware vendor breach that could put firmware and camera code into criminals’ hands. Finally, we explore how artificial intelligence adoption, new authentication bypass kits, and crime-as-a-service marketplaces are reshaping what “baseline” cyber risk looks like for teams of every size, with daily coverage available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Daily Cyber News – December 2nd, 2025</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Daily Cyber News – December 2nd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f67e7a6e-3de5-4bd8-8b55-91b114a59cf3</guid>
      <link>https://share.transistor.fm/s/d480366b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises.</p><p> </p><p>Listeners will hear how popular browser extensions turned into spying implants, how Chinese firms are quietly selling steganography tools to state aligned hackers, and how a long running airport and in flight Wi Fi imposter has finally been sentenced. The episode also covers a record breaking Coupang retail breach, a major mixer takedown that squeezes ransomware payments, and a deep lineup of stories on mobile banking fraud, fake storefronts, malicious updates, poisoned packages, and evolving espionage tradecraft, all tied back to what leaders and defenders can do next, with the daily feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises.</p><p> </p><p>Listeners will hear how popular browser extensions turned into spying implants, how Chinese firms are quietly selling steganography tools to state aligned hackers, and how a long running airport and in flight Wi Fi imposter has finally been sentenced. The episode also covers a record breaking Coupang retail breach, a major mixer takedown that squeezes ransomware payments, and a deep lineup of stories on mobile banking fraud, fake storefronts, malicious updates, poisoned packages, and evolving espionage tradecraft, all tied back to what leaders and defenders can do next, with the daily feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Dec 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d480366b/0fba71f5.mp3" length="38529944" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>962</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises.</p><p> </p><p>Listeners will hear how popular browser extensions turned into spying implants, how Chinese firms are quietly selling steganography tools to state aligned hackers, and how a long running airport and in flight Wi Fi imposter has finally been sentenced. The episode also covers a record breaking Coupang retail breach, a major mixer takedown that squeezes ransomware payments, and a deep lineup of stories on mobile banking fraud, fake storefronts, malicious updates, poisoned packages, and evolving espionage tradecraft, all tied back to what leaders and defenders can do next, with the daily feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d480366b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – December 1st, 2025</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Daily Cyber News – December 1st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f29e7fd0-0ab9-42a9-8db4-6d43cd83a59e</guid>
      <link>https://share.transistor.fm/s/f82767d1</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public GitLab projects, sensitive data leaking through paste tools, and North Korean-linked and legacy Python supply chain traps turning open source and old build scripts into compromise paths. Together these stories show how fraud, code leaks, and inherited technical debt now collide directly with revenue, trust, and regulatory risk.</p><p> </p><p>Listeners will also hear how cross-tenant Teams guests can slip past familiar defenses, industrial control dashboards and Android phones face targeted attacks, fake Google Meet pages push remote access tools, and doxxing and council outages turn geopolitical and criminal pressure into very local pain. The episode covers new research on hidden artificial intelligence browser prompts and poetic jailbreaks for nuclear topics, along with breaches at sports, manufacturing, and telecom organizations, a Mirai-style botnet test during a cloud outage, tightened Microsoft Entra sign-ins, and a high-profile arrest in Poland. It is built for leaders, defenders, and builders who need fast, plain-English context, and the daily audio feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public GitLab projects, sensitive data leaking through paste tools, and North Korean-linked and legacy Python supply chain traps turning open source and old build scripts into compromise paths. Together these stories show how fraud, code leaks, and inherited technical debt now collide directly with revenue, trust, and regulatory risk.</p><p> </p><p>Listeners will also hear how cross-tenant Teams guests can slip past familiar defenses, industrial control dashboards and Android phones face targeted attacks, fake Google Meet pages push remote access tools, and doxxing and council outages turn geopolitical and criminal pressure into very local pain. The episode covers new research on hidden artificial intelligence browser prompts and poetic jailbreaks for nuclear topics, along with breaches at sports, manufacturing, and telecom organizations, a Mirai-style botnet test during a cloud outage, tightened Microsoft Entra sign-ins, and a high-profile arrest in Poland. It is built for leaders, defenders, and builders who need fast, plain-English context, and the daily audio feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Dec 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f82767d1/4f5722b6.mp3" length="47368736" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1183</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public GitLab projects, sensitive data leaking through paste tools, and North Korean-linked and legacy Python supply chain traps turning open source and old build scripts into compromise paths. Together these stories show how fraud, code leaks, and inherited technical debt now collide directly with revenue, trust, and regulatory risk.</p><p> </p><p>Listeners will also hear how cross-tenant Teams guests can slip past familiar defenses, industrial control dashboards and Android phones face targeted attacks, fake Google Meet pages push remote access tools, and doxxing and council outages turn geopolitical and criminal pressure into very local pain. The episode covers new research on hidden artificial intelligence browser prompts and poetic jailbreaks for nuclear topics, along with breaches at sports, manufacturing, and telecom organizations, a Mirai-style botnet test during a cloud outage, tightened Microsoft Entra sign-ins, and a high-profile arrest in Poland. It is built for leaders, defenders, and builders who need fast, plain-English context, and the daily audio feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f82767d1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 28th, 2025</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Daily Cyber News – November 28th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b77f9a36-a997-47a0-ad1b-f7939c76f3a3</guid>
      <link>https://share.transistor.fm/s/2f53ca88</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affecting operations and data on around two million people, and twin campaigns that poison npm packages and GitHub Actions to steal secrets and threaten destructive wipes. A major Korean service provider breach spilling into financial firms rounds out the core supply-chain and data exposure stories.</p><p> </p><p>Listeners will also hear how firmware flaws in Nvidia DGX Spark systems, insecure Asus AiCloud routers, and risky Entra login scripts widen the technical edges of today’s attack surface. The brief covers third-party SaaS access via Gainsight and Salesforce, NetSupport based espionage against Central Asian banks and ministries, and a teen-led hacking crew alongside an open AI toolkit, KawaiiGPT, that lowers the bar for convincing attacks. It is designed for leaders, defenders, and builders who need clear stakes, business impact, and simple signals to watch, with a narrated feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affecting operations and data on around two million people, and twin campaigns that poison npm packages and GitHub Actions to steal secrets and threaten destructive wipes. A major Korean service provider breach spilling into financial firms rounds out the core supply-chain and data exposure stories.</p><p> </p><p>Listeners will also hear how firmware flaws in Nvidia DGX Spark systems, insecure Asus AiCloud routers, and risky Entra login scripts widen the technical edges of today’s attack surface. The brief covers third-party SaaS access via Gainsight and Salesforce, NetSupport based espionage against Central Asian banks and ministries, and a teen-led hacking crew alongside an open AI toolkit, KawaiiGPT, that lowers the bar for convincing attacks. It is designed for leaders, defenders, and builders who need clear stakes, business impact, and simple signals to watch, with a narrated feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 27 Nov 2025 21:23:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2f53ca88/5becae73.mp3" length="27618077" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affecting operations and data on around two million people, and twin campaigns that poison npm packages and GitHub Actions to steal secrets and threaten destructive wipes. A major Korean service provider breach spilling into financial firms rounds out the core supply-chain and data exposure stories.</p><p> </p><p>Listeners will also hear how firmware flaws in Nvidia DGX Spark systems, insecure Asus AiCloud routers, and risky Entra login scripts widen the technical edges of today’s attack surface. The brief covers third-party SaaS access via Gainsight and Salesforce, NetSupport based espionage against Central Asian banks and ministries, and a teen-led hacking crew alongside an open AI toolkit, KawaiiGPT, that lowers the bar for convincing attacks. It is designed for leaders, defenders, and builders who need clear stakes, business impact, and simple signals to watch, with a narrated feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2f53ca88/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 26th, 2025</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Daily Cyber News – November 26th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e5f6a8a4-fa30-4900-8392-7daff8e32100</guid>
      <link>https://share.transistor.fm/s/2db50fcf</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code helpers, major data exposures at an airline and a real estate finance firm, and disruptive hits to business platforms and cloud email. Rounding it out are big-picture shifts: nation-state crews pooling playbooks, seasonal phishing spikes, and new research that questions how much protection hardware security features really provide.</p><p> </p><p>Listeners will hear short, clear segments on each of the twenty stories covered in the BareMetalCyber Daily Brief, focused on what happened, why it matters, and who is most exposed. The episode highlights practical angles for leaders, defenders, and builders: vendor outages that ripple into public safety, email and identity attacks that bypass passwords, creative and personal devices becoming back doors, and automation tools that lower the bar for entry-level cybercrime. It is a fast-moving audio companion to the written brief, with every headline also available in the DailyCyber.news archive.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code helpers, major data exposures at an airline and a real estate finance firm, and disruptive hits to business platforms and cloud email. Rounding it out are big-picture shifts: nation-state crews pooling playbooks, seasonal phishing spikes, and new research that questions how much protection hardware security features really provide.</p><p> </p><p>Listeners will hear short, clear segments on each of the twenty stories covered in the BareMetalCyber Daily Brief, focused on what happened, why it matters, and who is most exposed. The episode highlights practical angles for leaders, defenders, and builders: vendor outages that ripple into public safety, email and identity attacks that bypass passwords, creative and personal devices becoming back doors, and automation tools that lower the bar for entry-level cybercrime. It is a fast-moving audio companion to the written brief, with every headline also available in the DailyCyber.news archive.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2db50fcf/a37de508.mp3" length="43189146" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1079</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code helpers, major data exposures at an airline and a real estate finance firm, and disruptive hits to business platforms and cloud email. Rounding it out are big-picture shifts: nation-state crews pooling playbooks, seasonal phishing spikes, and new research that questions how much protection hardware security features really provide.</p><p> </p><p>Listeners will hear short, clear segments on each of the twenty stories covered in the BareMetalCyber Daily Brief, focused on what happened, why it matters, and who is most exposed. The episode highlights practical angles for leaders, defenders, and builders: vendor outages that ripple into public safety, email and identity attacks that bypass passwords, creative and personal devices becoming back doors, and automation tools that lower the bar for entry-level cybercrime. It is a fast-moving audio companion to the written brief, with every headline also available in the DailyCyber.news archive.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2db50fcf/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 25th, 2025</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Daily Cyber News – November 25th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc93c52d-bbd0-40f9-9f88-09b9edcad073</guid>
      <link>https://share.transistor.fm/s/40ab786b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We also cover high-impact breaches at financial and customer-success vendors, along with data exposures at Harvard and a major dental insurer that put donor and patient details in play. Together, the episode focuses on how trusted tools, partners, and workflows are being bent to serve attackers while still looking ordinary on the surface.</p><p> </p><p>Listeners will hear plain-English walk-throughs of every story from the newsletter, including consumer and creative-device threats, messaging-based banking scams, and research on attackers leaning on artificial intelligence to generate fast-mutating malware. The episode highlights what these developments mean for leaders who own risk, defenders who run infrastructure and incident response, and builders who maintain software and data pipelines. Whether you care most about supply-chain integrity, third-party risk, or policy shifts in telecom regulation, the goal is to help you update mental models without drowning in jargon. The daily feed is also available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We also cover high-impact breaches at financial and customer-success vendors, along with data exposures at Harvard and a major dental insurer that put donor and patient details in play. Together, the episode focuses on how trusted tools, partners, and workflows are being bent to serve attackers while still looking ordinary on the surface.</p><p> </p><p>Listeners will hear plain-English walk-throughs of every story from the newsletter, including consumer and creative-device threats, messaging-based banking scams, and research on attackers leaning on artificial intelligence to generate fast-mutating malware. The episode highlights what these developments mean for leaders who own risk, defenders who run infrastructure and incident response, and builders who maintain software and data pipelines. Whether you care most about supply-chain integrity, third-party risk, or policy shifts in telecom regulation, the goal is to help you update mental models without drowning in jargon. The daily feed is also available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/40ab786b/14af80d0.mp3" length="49799170" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1244</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We also cover high-impact breaches at financial and customer-success vendors, along with data exposures at Harvard and a major dental insurer that put donor and patient details in play. Together, the episode focuses on how trusted tools, partners, and workflows are being bent to serve attackers while still looking ordinary on the surface.</p><p> </p><p>Listeners will hear plain-English walk-throughs of every story from the newsletter, including consumer and creative-device threats, messaging-based banking scams, and research on attackers leaning on artificial intelligence to generate fast-mutating malware. The episode highlights what these developments mean for leaders who own risk, defenders who run infrastructure and incident response, and builders who maintain software and data pipelines. Whether you care most about supply-chain integrity, third-party risk, or policy shifts in telecom regulation, the goal is to help you update mental models without drowning in jargon. The daily feed is also available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/40ab786b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 24th, 2025</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Daily Cyber News – November 24th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a8715b9e-8701-47cd-9f16-7c254143789e</guid>
      <link>https://share.transistor.fm/s/c171b266</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November twenty fourth, twenty twenty five. Today’s brief walks through a Gainsight supply chain breach that puts Salesforce customer data in play, an actively exploited flaw in Oracle Identity Manager, and a critical Azure Bastion bug that weakens a key cloud safety rail. You will also hear how a Grafana Enterprise identity issue can silently promote users to admins, why a widely used Seven Zip update now matters, and how new tooling in Metasploit raises the stakes for FortiWeb owners. Rounding it out, we cover a SonicWall VPN crash bug, fresh SolarWinds Serv U patches, WhatsApp account mapping research, and the BadAudio espionage campaign in Taiwan.</p><p>Listeners get a fast, spoken rundown of what happened, why it matters, and who is most exposed across identity, cloud, endpoints, and mobile. Leaders hear where to focus board and budget questions, while defenders get clear signals to watch in logs, configurations, and supplier relationships. The episode also highlights the growing weight of supply chain risk, from Salesforce integrations and Fortinet devices to regional software updates and telecom policy shifts. If you want a concise, human summary you can follow while commuting or context switching, the BareMetalCyber Daily Brief is available every day, with the narrated feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November twenty fourth, twenty twenty five. Today’s brief walks through a Gainsight supply chain breach that puts Salesforce customer data in play, an actively exploited flaw in Oracle Identity Manager, and a critical Azure Bastion bug that weakens a key cloud safety rail. You will also hear how a Grafana Enterprise identity issue can silently promote users to admins, why a widely used Seven Zip update now matters, and how new tooling in Metasploit raises the stakes for FortiWeb owners. Rounding it out, we cover a SonicWall VPN crash bug, fresh SolarWinds Serv U patches, WhatsApp account mapping research, and the BadAudio espionage campaign in Taiwan.</p><p>Listeners get a fast, spoken rundown of what happened, why it matters, and who is most exposed across identity, cloud, endpoints, and mobile. Leaders hear where to focus board and budget questions, while defenders get clear signals to watch in logs, configurations, and supplier relationships. The episode also highlights the growing weight of supply chain risk, from Salesforce integrations and Fortinet devices to regional software updates and telecom policy shifts. If you want a concise, human summary you can follow while commuting or context switching, the BareMetalCyber Daily Brief is available every day, with the narrated feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Nov 2025 03:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c171b266/5f26a74b.mp3" length="27620166" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November twenty fourth, twenty twenty five. Today’s brief walks through a Gainsight supply chain breach that puts Salesforce customer data in play, an actively exploited flaw in Oracle Identity Manager, and a critical Azure Bastion bug that weakens a key cloud safety rail. You will also hear how a Grafana Enterprise identity issue can silently promote users to admins, why a widely used Seven Zip update now matters, and how new tooling in Metasploit raises the stakes for FortiWeb owners. Rounding it out, we cover a SonicWall VPN crash bug, fresh SolarWinds Serv U patches, WhatsApp account mapping research, and the BadAudio espionage campaign in Taiwan.</p><p>Listeners get a fast, spoken rundown of what happened, why it matters, and who is most exposed across identity, cloud, endpoints, and mobile. Leaders hear where to focus board and budget questions, while defenders get clear signals to watch in logs, configurations, and supplier relationships. The episode also highlights the growing weight of supply chain risk, from Salesforce integrations and Fortinet devices to regional software updates and telecom policy shifts. If you want a concise, human summary you can follow while commuting or context switching, the BareMetalCyber Daily Brief is available every day, with the narrated feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c171b266/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 21st, 2025</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Daily Cyber News – November 21st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">81747b54-7301-4b6d-bfca-a5a4c8412ef3</guid>
      <link>https://share.transistor.fm/s/89c7a307</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 21st, 2025. Today’s brief connects front-line cyber operations to real-world impact, from Iran-aligned hackers using ship tracking data to support a failed missile strike to China-linked BadAudio espionage quietly harvesting government and telecom secrets. We spotlight active exploitation of Fortinet’s FortiWeb web application firewall, and a Salesforce–Gainsight integration issue that raises fresh questions about third-party access to core customer data. You will also hear how an unpatched Microsoft Office exploit and a critical Windows image-processing flaw give attackers low-friction ways into fully patched systems. Together, these stories sketch a risk picture where trusted tools, integrations, and everyday documents become powerful attack paths.</p><p>Listeners will get concise updates on ten high-impact stories, including a zero-day style Oracle E-Business Suite campaign against enterprise resource planning platforms, ransomware crews locking Amazon Simple Storage Service buckets through cloud misconfigurations, and a surge of hostile scanning against GlobalProtect virtual private network portals that many remote workers rely on. We close with Sturnus, a new Android banking trojan that steals on-screen data from encrypted messengers and enables high-yield mobile fraud. This feed is built for leaders, defenders, and builders who need a fast sense of what matters most today, and every episode is also available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 21st, 2025. Today’s brief connects front-line cyber operations to real-world impact, from Iran-aligned hackers using ship tracking data to support a failed missile strike to China-linked BadAudio espionage quietly harvesting government and telecom secrets. We spotlight active exploitation of Fortinet’s FortiWeb web application firewall, and a Salesforce–Gainsight integration issue that raises fresh questions about third-party access to core customer data. You will also hear how an unpatched Microsoft Office exploit and a critical Windows image-processing flaw give attackers low-friction ways into fully patched systems. Together, these stories sketch a risk picture where trusted tools, integrations, and everyday documents become powerful attack paths.</p><p>Listeners will get concise updates on ten high-impact stories, including a zero-day style Oracle E-Business Suite campaign against enterprise resource planning platforms, ransomware crews locking Amazon Simple Storage Service buckets through cloud misconfigurations, and a surge of hostile scanning against GlobalProtect virtual private network portals that many remote workers rely on. We close with Sturnus, a new Android banking trojan that steals on-screen data from encrypted messengers and enables high-yield mobile fraud. This feed is built for leaders, defenders, and builders who need a fast sense of what matters most today, and every episode is also available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/89c7a307/20163556.mp3" length="18067709" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>451</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 21st, 2025. Today’s brief connects front-line cyber operations to real-world impact, from Iran-aligned hackers using ship tracking data to support a failed missile strike to China-linked BadAudio espionage quietly harvesting government and telecom secrets. We spotlight active exploitation of Fortinet’s FortiWeb web application firewall, and a Salesforce–Gainsight integration issue that raises fresh questions about third-party access to core customer data. You will also hear how an unpatched Microsoft Office exploit and a critical Windows image-processing flaw give attackers low-friction ways into fully patched systems. Together, these stories sketch a risk picture where trusted tools, integrations, and everyday documents become powerful attack paths.</p><p>Listeners will get concise updates on ten high-impact stories, including a zero-day style Oracle E-Business Suite campaign against enterprise resource planning platforms, ransomware crews locking Amazon Simple Storage Service buckets through cloud misconfigurations, and a surge of hostile scanning against GlobalProtect virtual private network portals that many remote workers rely on. We close with Sturnus, a new Android banking trojan that steals on-screen data from encrypted messengers and enables high-yield mobile fraud. This feed is built for leaders, defenders, and builders who need a fast sense of what matters most today, and every episode is also available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/89c7a307/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 20th, 2025</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Daily Cyber News – November 20th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">52142118-535d-47de-9b78-fe458df98bb9</guid>
      <link>https://share.transistor.fm/s/ace13f2e</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 20th, 2025. Today’s brief tracks how fragile our internet plumbing has become, from hijacked home routers and a major Cloudflare outage to record-setting attacks against Azure and a fresh browser flaw already under exploitation. You will hear how a massive botnet built from aging ASUS routers, a FortiWeb zero day, and an actively abused 7-Zip bug combine into a broad, internet-facing risk picture for everyday businesses. The episode also looks at a China-linked software update hijack, a high-impact Chrome engine bug, and a sophisticated phishing kit that makes Microsoft cloud logins look and feel real even as they are stolen. Finally, we touch on sanctions against a key ransomware infrastructure host and a confirmed breach at European fiber provider Eurofiber, both of which highlight how attackers are targeting the connective tissue between organizations.</p><p> </p><p>Listeners will get a clear rundown of what happened, who is most exposed, and why these stories matter to both leadership teams and defenders on the ground. The focus stays on practical signals to watch, from router and firewall behavior to browser versions, phishing patterns, and telecom dependencies, so you can translate headlines into concrete checks in your own environment. If you are responsible for risk, operations, or incident response, this is designed to help you decide where to look first rather than overwhelm you with jargon. The daily feed is available at DailyCyber.news, with each episode paired to a written brief you can share with colleagues and leadership.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 20th, 2025. Today’s brief tracks how fragile our internet plumbing has become, from hijacked home routers and a major Cloudflare outage to record-setting attacks against Azure and a fresh browser flaw already under exploitation. You will hear how a massive botnet built from aging ASUS routers, a FortiWeb zero day, and an actively abused 7-Zip bug combine into a broad, internet-facing risk picture for everyday businesses. The episode also looks at a China-linked software update hijack, a high-impact Chrome engine bug, and a sophisticated phishing kit that makes Microsoft cloud logins look and feel real even as they are stolen. Finally, we touch on sanctions against a key ransomware infrastructure host and a confirmed breach at European fiber provider Eurofiber, both of which highlight how attackers are targeting the connective tissue between organizations.</p><p> </p><p>Listeners will get a clear rundown of what happened, who is most exposed, and why these stories matter to both leadership teams and defenders on the ground. The focus stays on practical signals to watch, from router and firewall behavior to browser versions, phishing patterns, and telecom dependencies, so you can translate headlines into concrete checks in your own environment. If you are responsible for risk, operations, or incident response, this is designed to help you decide where to look first rather than overwhelm you with jargon. The daily feed is available at DailyCyber.news, with each episode paired to a written brief you can share with colleagues and leadership.</p>]]>
      </content:encoded>
      <pubDate>Thu, 20 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ace13f2e/6f51dc3c.mp3" length="19408917" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>484</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 20th, 2025. Today’s brief tracks how fragile our internet plumbing has become, from hijacked home routers and a major Cloudflare outage to record-setting attacks against Azure and a fresh browser flaw already under exploitation. You will hear how a massive botnet built from aging ASUS routers, a FortiWeb zero day, and an actively abused 7-Zip bug combine into a broad, internet-facing risk picture for everyday businesses. The episode also looks at a China-linked software update hijack, a high-impact Chrome engine bug, and a sophisticated phishing kit that makes Microsoft cloud logins look and feel real even as they are stolen. Finally, we touch on sanctions against a key ransomware infrastructure host and a confirmed breach at European fiber provider Eurofiber, both of which highlight how attackers are targeting the connective tissue between organizations.</p><p> </p><p>Listeners will get a clear rundown of what happened, who is most exposed, and why these stories matter to both leadership teams and defenders on the ground. The focus stays on practical signals to watch, from router and firewall behavior to browser versions, phishing patterns, and telecom dependencies, so you can translate headlines into concrete checks in your own environment. If you are responsible for risk, operations, or incident response, this is designed to help you decide where to look first rather than overwhelm you with jargon. The daily feed is available at DailyCyber.news, with each episode paired to a written brief you can share with colleagues and leadership.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ace13f2e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 19th, 2025</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Daily Cyber News – November 19th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4fe6f97d-5273-4a7a-839c-58e03a488dbd</guid>
      <link>https://share.transistor.fm/s/3ba91289</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 19th, 2025. Today’s brief covers a global Cloudflare outage that briefly knocked major sites offline, a French childcare payroll breach affecting about one point two million people, and a Dutch police takedown of crime-friendly hosting servers. You will also hear about an urgent Google Chrome zero-day fix and an actively exploited Fortinet FortiWeb firewall flaw that both demand fast patching. Together, these stories show how fragile internet plumbing, trusted vendors, and perimeter defenses can quickly become pressure points for every kind of organization.</p><p>You also get updates on quiet WhatsApp number harvesting, a record-breaking Azure distributed denial-of-service attack, and a DoorDash breach driven by social engineering at a vendor. The episode rounds out with threats to emerging infrastructure, including ShadowRay cryptomining on artificial intelligence clusters and malicious npm packages that redirect developers to crypto scams. This mix is designed for security leaders, defenders, and builders who need a fast, plain-English rundown of what changed in the last day and why it matters, available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 19th, 2025. Today’s brief covers a global Cloudflare outage that briefly knocked major sites offline, a French childcare payroll breach affecting about one point two million people, and a Dutch police takedown of crime-friendly hosting servers. You will also hear about an urgent Google Chrome zero-day fix and an actively exploited Fortinet FortiWeb firewall flaw that both demand fast patching. Together, these stories show how fragile internet plumbing, trusted vendors, and perimeter defenses can quickly become pressure points for every kind of organization.</p><p>You also get updates on quiet WhatsApp number harvesting, a record-breaking Azure distributed denial-of-service attack, and a DoorDash breach driven by social engineering at a vendor. The episode rounds out with threats to emerging infrastructure, including ShadowRay cryptomining on artificial intelligence clusters and malicious npm packages that redirect developers to crypto scams. This mix is designed for security leaders, defenders, and builders who need a fast, plain-English rundown of what changed in the last day and why it matters, available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ba91289/e986de2c.mp3" length="19252623" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>481</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 19th, 2025. Today’s brief covers a global Cloudflare outage that briefly knocked major sites offline, a French childcare payroll breach affecting about one point two million people, and a Dutch police takedown of crime-friendly hosting servers. You will also hear about an urgent Google Chrome zero-day fix and an actively exploited Fortinet FortiWeb firewall flaw that both demand fast patching. Together, these stories show how fragile internet plumbing, trusted vendors, and perimeter defenses can quickly become pressure points for every kind of organization.</p><p>You also get updates on quiet WhatsApp number harvesting, a record-breaking Azure distributed denial-of-service attack, and a DoorDash breach driven by social engineering at a vendor. The episode rounds out with threats to emerging infrastructure, including ShadowRay cryptomining on artificial intelligence clusters and malicious npm packages that redirect developers to crypto scams. This mix is designed for security leaders, defenders, and builders who need a fast, plain-English rundown of what changed in the last day and why it matters, available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ba91289/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 18th, 2025</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Daily Cyber News – November 18th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7a019211-be0e-4c56-94fa-ea4b12ee2193</guid>
      <link>https://share.transistor.fm/s/2e3c4426</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November eighteenth, twenty twenty five. In this episode, you will hear how a third-party breach at a major political advocacy group, new North Korean supply chain malware, and data theft from a state attorney general’s office are reshaping the privacy and regulatory picture. We also cover active exploitation of a Fortinet web firewall flaw, a record breaking cloud denial of service attack on Microsoft Azure, and fresh pressure on email trust after a DoorDash spoofing weakness. Rounding things out, the brief walks through an alleged ransomware hit on Under Armour, breaches at Princeton and a French fiber provider, a Dutch takedown of bulletproof hosting, and the RondoDox botnet abusing old XWiki bugs.</p><p>Leaders, defenders, and builders will get a fast, plain English rundown that connects technical incidents to business risk, resilience planning, and fraud trends. You will hear how attacker tactics around supply chain implants, payroll fraud, and infrastructure abuse are evolving, and what it means for priorities like vendor governance, backup strategy, and secure-by-design coding. The brief focuses on practical signals to watch in your own logs and access patterns so you can adapt controls without drowning in detail. A narrated feed of these daily episodes is also available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November eighteenth, twenty twenty five. In this episode, you will hear how a third-party breach at a major political advocacy group, new North Korean supply chain malware, and data theft from a state attorney general’s office are reshaping the privacy and regulatory picture. We also cover active exploitation of a Fortinet web firewall flaw, a record breaking cloud denial of service attack on Microsoft Azure, and fresh pressure on email trust after a DoorDash spoofing weakness. Rounding things out, the brief walks through an alleged ransomware hit on Under Armour, breaches at Princeton and a French fiber provider, a Dutch takedown of bulletproof hosting, and the RondoDox botnet abusing old XWiki bugs.</p><p>Leaders, defenders, and builders will get a fast, plain English rundown that connects technical incidents to business risk, resilience planning, and fraud trends. You will hear how attacker tactics around supply chain implants, payroll fraud, and infrastructure abuse are evolving, and what it means for priorities like vendor governance, backup strategy, and secure-by-design coding. The brief focuses on practical signals to watch in your own logs and access patterns so you can adapt controls without drowning in detail. A narrated feed of these daily episodes is also available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Nov 2025 06:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2e3c4426/db14c114.mp3" length="16705162" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>417</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November eighteenth, twenty twenty five. In this episode, you will hear how a third-party breach at a major political advocacy group, new North Korean supply chain malware, and data theft from a state attorney general’s office are reshaping the privacy and regulatory picture. We also cover active exploitation of a Fortinet web firewall flaw, a record breaking cloud denial of service attack on Microsoft Azure, and fresh pressure on email trust after a DoorDash spoofing weakness. Rounding things out, the brief walks through an alleged ransomware hit on Under Armour, breaches at Princeton and a French fiber provider, a Dutch takedown of bulletproof hosting, and the RondoDox botnet abusing old XWiki bugs.</p><p>Leaders, defenders, and builders will get a fast, plain English rundown that connects technical incidents to business risk, resilience planning, and fraud trends. You will hear how attacker tactics around supply chain implants, payroll fraud, and infrastructure abuse are evolving, and what it means for priorities like vendor governance, backup strategy, and secure-by-design coding. The brief focuses on practical signals to watch in your own logs and access patterns so you can adapt controls without drowning in detail. A narrated feed of these daily episodes is also available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2e3c4426/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 17th, 2025</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Daily Cyber News – November 17th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96708516-a431-4ee3-b7f2-701c74708107</guid>
      <link>https://share.transistor.fm/s/66a7bd3e</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 17th, 2025. The brief opens with Jaguar Land Rover’s factory shutdown turning into a seven hundred fifty million dollar quarterly loss and a stark reminder that cyber incidents now hit the balance sheet as hard as any supply chain shock. We also cover a state-linked campaign that misused Anthropic’s coding agent for espionage and a fresh DoorDash breach driven by social engineering, alongside a Fortinet web firewall flaw and Microsoft’s latest Windows zero-day patch that both demand rapid action.</p><p>Listeners will hear concise updates on active attacks against Cisco firewalls, Logitech’s extortion-driven breach, and critical weaknesses in AI inference engines from major vendors. The episode also breaks down how flaws in shared-hosting security tools and older ASUS routers can quietly expose millions of small websites and remote workers. This feed is designed for executives and defenders who need fast, plain-English context on the day’s top risks, with the daily stream available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 17th, 2025. The brief opens with Jaguar Land Rover’s factory shutdown turning into a seven hundred fifty million dollar quarterly loss and a stark reminder that cyber incidents now hit the balance sheet as hard as any supply chain shock. We also cover a state-linked campaign that misused Anthropic’s coding agent for espionage and a fresh DoorDash breach driven by social engineering, alongside a Fortinet web firewall flaw and Microsoft’s latest Windows zero-day patch that both demand rapid action.</p><p>Listeners will hear concise updates on active attacks against Cisco firewalls, Logitech’s extortion-driven breach, and critical weaknesses in AI inference engines from major vendors. The episode also breaks down how flaws in shared-hosting security tools and older ASUS routers can quietly expose millions of small websites and remote workers. This feed is designed for executives and defenders who need fast, plain-English context on the day’s top risks, with the daily stream available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Nov 2025 02:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/66a7bd3e/1ff1911a.mp3" length="21261962" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>531</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 17th, 2025. The brief opens with Jaguar Land Rover’s factory shutdown turning into a seven hundred fifty million dollar quarterly loss and a stark reminder that cyber incidents now hit the balance sheet as hard as any supply chain shock. We also cover a state-linked campaign that misused Anthropic’s coding agent for espionage and a fresh DoorDash breach driven by social engineering, alongside a Fortinet web firewall flaw and Microsoft’s latest Windows zero-day patch that both demand rapid action.</p><p>Listeners will hear concise updates on active attacks against Cisco firewalls, Logitech’s extortion-driven breach, and critical weaknesses in AI inference engines from major vendors. The episode also breaks down how flaws in shared-hosting security tools and older ASUS routers can quietly expose millions of small websites and remote workers. This feed is designed for executives and defenders who need fast, plain-English context on the day’s top risks, with the daily stream available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/66a7bd3e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, November 14th, 2025</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Weekly Cyber News Rollup, November 14th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">50a13133-0487-4abe-9349-14d31b1eed2d</guid>
      <link>https://share.transistor.fm/s/b4dce9c4</link>
      <description>
        <![CDATA[<p>This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.</p><p>Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.</p><p>Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Nov 2025 17:54:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b4dce9c4/309e347e.mp3" length="29436166" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>735</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.</p><p>Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b4dce9c4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 14th, 2025</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Daily Cyber News – November 14th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c768221e-d1e8-4735-8164-fffb3d3c0818</guid>
      <link>https://share.transistor.fm/s/e7e07c49</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 14th, 2025. Today’s brief connects travel scams, AI secrets, and live social engineering with active attacks on the edge of the network. You’ll hear how fake hotel booking sites quietly skim payment cards, why leading AI companies are leaking access keys from forgotten GitHub repos, and how WhatsApp screen-sharing scams let fraudsters drain accounts in real time. We also cover critical flaws in popular firewalls and a new Akira ransomware tactic that can take down entire Nutanix clusters. Together, these stories show how everyday tools can quickly become high-impact attack paths.</p><p>Listeners get a fast tour of the top ten threats shaping risk right now, from hotel and SMS fraud to cloud code leaks, perimeter device exploitation, and emerging attacks on virtualized data centers and shared hosting. Leaders will understand where to push for better visibility and stronger vendor assurances, defenders will pick up practical signals to hunt for in logs and telemetry, and builders will hear why safer defaults matter in AI and developer tooling. All in one short daily listen, with every headline also available in written form at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 14th, 2025. Today’s brief connects travel scams, AI secrets, and live social engineering with active attacks on the edge of the network. You’ll hear how fake hotel booking sites quietly skim payment cards, why leading AI companies are leaking access keys from forgotten GitHub repos, and how WhatsApp screen-sharing scams let fraudsters drain accounts in real time. We also cover critical flaws in popular firewalls and a new Akira ransomware tactic that can take down entire Nutanix clusters. Together, these stories show how everyday tools can quickly become high-impact attack paths.</p><p>Listeners get a fast tour of the top ten threats shaping risk right now, from hotel and SMS fraud to cloud code leaks, perimeter device exploitation, and emerging attacks on virtualized data centers and shared hosting. Leaders will understand where to push for better visibility and stronger vendor assurances, defenders will pick up practical signals to hunt for in logs and telemetry, and builders will hear why safer defaults matter in AI and developer tooling. All in one short daily listen, with every headline also available in written form at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Nov 2025 08:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e7e07c49/fbe10149.mp3" length="19016477" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>475</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 14th, 2025. Today’s brief connects travel scams, AI secrets, and live social engineering with active attacks on the edge of the network. You’ll hear how fake hotel booking sites quietly skim payment cards, why leading AI companies are leaking access keys from forgotten GitHub repos, and how WhatsApp screen-sharing scams let fraudsters drain accounts in real time. We also cover critical flaws in popular firewalls and a new Akira ransomware tactic that can take down entire Nutanix clusters. Together, these stories show how everyday tools can quickly become high-impact attack paths.</p><p>Listeners get a fast tour of the top ten threats shaping risk right now, from hotel and SMS fraud to cloud code leaks, perimeter device exploitation, and emerging attacks on virtualized data centers and shared hosting. Leaders will understand where to push for better visibility and stronger vendor assurances, defenders will pick up practical signals to hunt for in logs and telemetry, and builders will hear why safer defaults matter in AI and developer tooling. All in one short daily listen, with every headline also available in written form at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e7e07c49/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 13th, 2025</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Daily Cyber News – November 13th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f89c5246-ce11-4783-8c00-d8fc9e49bd3a</guid>
      <link>https://share.transistor.fm/s/4a728563</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 13th, 2025. In this episode you’ll hear how a state-aligned group is abusing Cisco and Citrix identity platforms as quiet beachheads, while a fresh Windows kernel zero-day turns small footholds into full-system compromise if left unpatched. We also cover Google’s lawsuit against the Lighthouse phishing service that fueled massive toll-payment scams, a streamlined Microsoft 365 redirection campaign driving global account takeovers, and the United Kingdom’s proposed Cyber Security and Resilience Bill that would push hospitals, utilities, and transport operators toward tougher baseline controls.</p><p>You’ll then move into the defender’s trench with a revived DanaBot banking trojan, WinRAR exploits aimed at South Asian governments, and new flaws in GitHub Copilot and Visual Studio that raise software supply chain questions. The brief closes with Windows 11’s growing passkey support through major password managers and a sprawling travel-brand phishing wave that uses thousands of fake domains to skim card data. It is a fast, focused rundown for leaders, defenders, and builders, with a daily feed of past episodes available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 13th, 2025. In this episode you’ll hear how a state-aligned group is abusing Cisco and Citrix identity platforms as quiet beachheads, while a fresh Windows kernel zero-day turns small footholds into full-system compromise if left unpatched. We also cover Google’s lawsuit against the Lighthouse phishing service that fueled massive toll-payment scams, a streamlined Microsoft 365 redirection campaign driving global account takeovers, and the United Kingdom’s proposed Cyber Security and Resilience Bill that would push hospitals, utilities, and transport operators toward tougher baseline controls.</p><p>You’ll then move into the defender’s trench with a revived DanaBot banking trojan, WinRAR exploits aimed at South Asian governments, and new flaws in GitHub Copilot and Visual Studio that raise software supply chain questions. The brief closes with Windows 11’s growing passkey support through major password managers and a sprawling travel-brand phishing wave that uses thousands of fake domains to skim card data. It is a fast, focused rundown for leaders, defenders, and builders, with a daily feed of past episodes available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 13 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4a728563/c474ec76.mp3" length="16232277" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>405</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 13th, 2025. In this episode you’ll hear how a state-aligned group is abusing Cisco and Citrix identity platforms as quiet beachheads, while a fresh Windows kernel zero-day turns small footholds into full-system compromise if left unpatched. We also cover Google’s lawsuit against the Lighthouse phishing service that fueled massive toll-payment scams, a streamlined Microsoft 365 redirection campaign driving global account takeovers, and the United Kingdom’s proposed Cyber Security and Resilience Bill that would push hospitals, utilities, and transport operators toward tougher baseline controls.</p><p>You’ll then move into the defender’s trench with a revived DanaBot banking trojan, WinRAR exploits aimed at South Asian governments, and new flaws in GitHub Copilot and Visual Studio that raise software supply chain questions. The brief closes with Windows 11’s growing passkey support through major password managers and a sprawling travel-brand phishing wave that uses thousands of fake domains to skim card data. It is a fast, focused rundown for leaders, defenders, and builders, with a daily feed of past episodes available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4a728563/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 12th, 2025</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Daily Cyber News – November 12th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e7fbf5b-5059-4e5d-89a3-1703c73df675</guid>
      <link>https://share.transistor.fm/s/6f3fb3f8</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywhere Monitor, and Samsung’s latest mobile flaw enters the Known Exploited catalog. Ransomware-as-a-service expands with VanHelsing, Synology’s BeeStation faces an unauthenticated zero-day, and Brazil sees WhatsApp-driven bank session hijacking. Rounding out the brief: GootLoader’s stealthy web-font trick and fresh Ivanti Endpoint Manager issues that enable arbitrary file writes.</p><p>You’ll hear what changed, why it matters, who is most exposed, and the near-term moves that shrink risk. Leaders get business-impact framing; defenders get plain-English signals to watch and pragmatic steps tied to identity, patching, and endpoint controls. The focus is tight: the Top 10 from today’s newsletter only—no filler. It’s a fast, narrated briefing for students and practitioners alike, available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywhere Monitor, and Samsung’s latest mobile flaw enters the Known Exploited catalog. Ransomware-as-a-service expands with VanHelsing, Synology’s BeeStation faces an unauthenticated zero-day, and Brazil sees WhatsApp-driven bank session hijacking. Rounding out the brief: GootLoader’s stealthy web-font trick and fresh Ivanti Endpoint Manager issues that enable arbitrary file writes.</p><p>You’ll hear what changed, why it matters, who is most exposed, and the near-term moves that shrink risk. Leaders get business-impact framing; defenders get plain-English signals to watch and pragmatic steps tied to identity, patching, and endpoint controls. The focus is tight: the Top 10 from today’s newsletter only—no filler. It’s a fast, narrated briefing for students and practitioners alike, available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Nov 2025 02:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6f3fb3f8/3b29754a.mp3" length="16730517" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>417</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywhere Monitor, and Samsung’s latest mobile flaw enters the Known Exploited catalog. Ransomware-as-a-service expands with VanHelsing, Synology’s BeeStation faces an unauthenticated zero-day, and Brazil sees WhatsApp-driven bank session hijacking. Rounding out the brief: GootLoader’s stealthy web-font trick and fresh Ivanti Endpoint Manager issues that enable arbitrary file writes.</p><p>You’ll hear what changed, why it matters, who is most exposed, and the near-term moves that shrink risk. Leaders get business-impact framing; defenders get plain-English signals to watch and pragmatic steps tied to identity, patching, and endpoint controls. The focus is tight: the Top 10 from today’s newsletter only—no filler. It’s a fast, narrated briefing for students and practitioners alike, available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f3fb3f8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 11th, 2025</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Daily Cyber News – November 11th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b323bc7a-5409-4437-b38c-f73d479eae7b</guid>
      <link>https://share.transistor.fm/s/d38ac422</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 11th, 2025. We open with a federal push to patch a Samsung zero-day powering stealth phone spyware, then move to a North Korea–linked abuse of Google’s device-finding features as a remote kill switch. Developer ecosystems are in focus as booby-trapped Visual Studio Code extensions siphon secrets, while a breach at Knownsec exposes state-grade tools and target lists. Rounding out the first half, a turnkey kit reroutes victims to steal Microsoft 365 logins and tokens, underscoring how cheaply mass account takeover still happens in busy enterprises.</p><p>In the back half, we cover a fresh attack variant that crashes unpatched Cisco firewalls, a tiny JavaScript parser flaw that enables remote code execution, and NuGet “time-bombs” designed to detonate well after deployment. We then detail unsafe deserialization in LangGraph that lets attackers hijack AI pipelines on load, and a Monsta FTP bug that left thousands of servers open to takeover. Leaders, defenders, and builders get plain-English impact, who is most exposed, and practical signals to watch—available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 11th, 2025. We open with a federal push to patch a Samsung zero-day powering stealth phone spyware, then move to a North Korea–linked abuse of Google’s device-finding features as a remote kill switch. Developer ecosystems are in focus as booby-trapped Visual Studio Code extensions siphon secrets, while a breach at Knownsec exposes state-grade tools and target lists. Rounding out the first half, a turnkey kit reroutes victims to steal Microsoft 365 logins and tokens, underscoring how cheaply mass account takeover still happens in busy enterprises.</p><p>In the back half, we cover a fresh attack variant that crashes unpatched Cisco firewalls, a tiny JavaScript parser flaw that enables remote code execution, and NuGet “time-bombs” designed to detonate well after deployment. We then detail unsafe deserialization in LangGraph that lets attackers hijack AI pipelines on load, and a Monsta FTP bug that left thousands of servers open to takeover. Leaders, defenders, and builders get plain-English impact, who is most exposed, and practical signals to watch—available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d38ac422/e6c472ac.mp3" length="17377528" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>434</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 11th, 2025. We open with a federal push to patch a Samsung zero-day powering stealth phone spyware, then move to a North Korea–linked abuse of Google’s device-finding features as a remote kill switch. Developer ecosystems are in focus as booby-trapped Visual Studio Code extensions siphon secrets, while a breach at Knownsec exposes state-grade tools and target lists. Rounding out the first half, a turnkey kit reroutes victims to steal Microsoft 365 logins and tokens, underscoring how cheaply mass account takeover still happens in busy enterprises.</p><p>In the back half, we cover a fresh attack variant that crashes unpatched Cisco firewalls, a tiny JavaScript parser flaw that enables remote code execution, and NuGet “time-bombs” designed to detonate well after deployment. We then detail unsafe deserialization in LangGraph that lets attackers hijack AI pipelines on load, and a Monsta FTP bug that left thousands of servers open to takeover. Leaders, defenders, and builders get plain-English impact, who is most exposed, and practical signals to watch—available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d38ac422/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 10th, 2025</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Daily Cyber News – November 10th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4be57ef7-ddca-420f-926d-71e5c8962bab</guid>
      <link>https://share.transistor.fm/s/03039b6b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 10th, 2025. Today’s brief centers on patient espionage in the nonprofit policy world, a convincing Booking.com guest scam that installs remote access tools, and a new Google Maps path to fight coordinated review extortion. We also cover a WhatsApp image flaw used to drop LANDFALL spyware on certain Samsung phones and container-escape weaknesses in runC that threaten Kubernetes hosts. Rounding out the update: Cisco edge firewalls forced into reboot loops, seven QNAP zero-days patched, NuGet “time bombs” aimed at databases and P L Cs, a side-channel exposing A I chat topics, and a critical Cisco U C C X fix.</p><p>Leaders will hear clear business impact and response priorities across reputation, mobile, and platform risks. Defenders get concrete detection signals for identity abuse in the cloud, supply-chain hygiene for developer tools, hardened partner access in hospitality, and runtime safeguards for clusters and contact centers. Builders and platform owners will appreciate practical guidance on dependency allowlists, token rotation, and safer extension policies. The daily narrated feed is available at DailyCyber.news. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 10th, 2025. Today’s brief centers on patient espionage in the nonprofit policy world, a convincing Booking.com guest scam that installs remote access tools, and a new Google Maps path to fight coordinated review extortion. We also cover a WhatsApp image flaw used to drop LANDFALL spyware on certain Samsung phones and container-escape weaknesses in runC that threaten Kubernetes hosts. Rounding out the update: Cisco edge firewalls forced into reboot loops, seven QNAP zero-days patched, NuGet “time bombs” aimed at databases and P L Cs, a side-channel exposing A I chat topics, and a critical Cisco U C C X fix.</p><p>Leaders will hear clear business impact and response priorities across reputation, mobile, and platform risks. Defenders get concrete detection signals for identity abuse in the cloud, supply-chain hygiene for developer tools, hardened partner access in hospitality, and runtime safeguards for clusters and contact centers. Builders and platform owners will appreciate practical guidance on dependency allowlists, token rotation, and safer extension policies. The daily narrated feed is available at DailyCyber.news. </p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/03039b6b/e8dbf226.mp3" length="17995768" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>449</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 10th, 2025. Today’s brief centers on patient espionage in the nonprofit policy world, a convincing Booking.com guest scam that installs remote access tools, and a new Google Maps path to fight coordinated review extortion. We also cover a WhatsApp image flaw used to drop LANDFALL spyware on certain Samsung phones and container-escape weaknesses in runC that threaten Kubernetes hosts. Rounding out the update: Cisco edge firewalls forced into reboot loops, seven QNAP zero-days patched, NuGet “time bombs” aimed at databases and P L Cs, a side-channel exposing A I chat topics, and a critical Cisco U C C X fix.</p><p>Leaders will hear clear business impact and response priorities across reputation, mobile, and platform risks. Defenders get concrete detection signals for identity abuse in the cloud, supply-chain hygiene for developer tools, hardened partner access in hospitality, and runtime safeguards for clusters and contact centers. Builders and platform owners will appreciate practical guidance on dependency allowlists, token rotation, and safer extension policies. The daily narrated feed is available at DailyCyber.news. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/03039b6b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, November 7th, 2025</title>
      <itunes:title>Weekly Cyber News Rollup, November 7th, 2025</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">3dc50613-fd43-4677-8b6d-15e27d5e032e</guid>
      <link>https://share.transistor.fm/s/4d759fac</link>
      <description>
        <![CDATA[<p>This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.</p><p>Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.</p><p>Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Sat, 08 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4d759fac/a8c9a1fd.mp3" length="38515272" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>963</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.</p><p>Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4d759fac/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 7th, 2025</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Daily Cyber News – November 7th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3e3026c-188f-4111-b856-7ae5a49eabfc</guid>
      <link>https://share.transistor.fm/s/7586b6b1</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty agencies, surfacing practical fixes. Cisco warns unpatched Secure Firewall devices can reload under attack, and separately ships a critical contact-center fix that closes a root-level takeover. SonicWall says a state actor accessed a cloud-backup environment, raising follow-on intrusion risk from exposed rules and credentials. Taken together, these stories underscore how edge resilience and disciplined vendor hygiene can prevent outages and ugly surprises.</p><p>Listeners will also hear a concise rundown of Clop’s claim against the Washington Post, Sandworm’s destructive wipers hitting parts of Ukraine’s grain sector, and new findings that ChatGPT and similar platforms can leak data or keep sessions alive longer than intended. We close with Google’s warning about self-modifying malware and a malicious Visual Studio Code extension that briefly delivered ransomware. Leaders get plain business impact and priority calls; defenders get clear signals to watch and immediate steps. The daily feed and narrated archive are available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty agencies, surfacing practical fixes. Cisco warns unpatched Secure Firewall devices can reload under attack, and separately ships a critical contact-center fix that closes a root-level takeover. SonicWall says a state actor accessed a cloud-backup environment, raising follow-on intrusion risk from exposed rules and credentials. Taken together, these stories underscore how edge resilience and disciplined vendor hygiene can prevent outages and ugly surprises.</p><p>Listeners will also hear a concise rundown of Clop’s claim against the Washington Post, Sandworm’s destructive wipers hitting parts of Ukraine’s grain sector, and new findings that ChatGPT and similar platforms can leak data or keep sessions alive longer than intended. We close with Google’s warning about self-modifying malware and a malicious Visual Studio Code extension that briefly delivered ransomware. Leaders get plain business impact and priority calls; defenders get clear signals to watch and immediate steps. The daily feed and narrated archive are available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Sat, 08 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7586b6b1/7c15a120.mp3" length="39853108" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>996</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty agencies, surfacing practical fixes. Cisco warns unpatched Secure Firewall devices can reload under attack, and separately ships a critical contact-center fix that closes a root-level takeover. SonicWall says a state actor accessed a cloud-backup environment, raising follow-on intrusion risk from exposed rules and credentials. Taken together, these stories underscore how edge resilience and disciplined vendor hygiene can prevent outages and ugly surprises.</p><p>Listeners will also hear a concise rundown of Clop’s claim against the Washington Post, Sandworm’s destructive wipers hitting parts of Ukraine’s grain sector, and new findings that ChatGPT and similar platforms can leak data or keep sessions alive longer than intended. We close with Google’s warning about self-modifying malware and a malicious Visual Studio Code extension that briefly delivered ransomware. Leaders get plain business impact and priority calls; defenders get clear signals to watch and immediate steps. The daily feed and narrated archive are available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7586b6b1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Daily Cyber News – November 6th, 2025</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Daily Cyber News – November 6th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">89229ba0-3028-4c51-bd20-e608e4cbb0fa</guid>
      <link>https://share.transistor.fm/s/aba094a1</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web Panel flaw lands on the exploited-bugs list with urgent patch guidance. Rounding out the first half, we cover renewed “BadCandy” implants on Cisco routers—an edge risk that can quietly reroute traffic and blind monitoring if firmware and access paths lag.</p><p>Listeners will also hear how new U.S. sanctions aim to choke off laundering networks tied to North Korean cyber operations, SonicWall’s attribution of a September breach to a state actor that accessed firewall backups, and research on shapeshifting, model-assisted malware that burns indicators fast. We highlight a high-severity React Native C L I flaw that threatens the developer supply chain during scaffolding and close with United Kingdom carriers moving to block spoofed numbers that fuel vishing. Practical takeaways span leaders, defenders, and builders, with the narrated feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web Panel flaw lands on the exploited-bugs list with urgent patch guidance. Rounding out the first half, we cover renewed “BadCandy” implants on Cisco routers—an edge risk that can quietly reroute traffic and blind monitoring if firmware and access paths lag.</p><p>Listeners will also hear how new U.S. sanctions aim to choke off laundering networks tied to North Korean cyber operations, SonicWall’s attribution of a September breach to a state actor that accessed firewall backups, and research on shapeshifting, model-assisted malware that burns indicators fast. We highlight a high-severity React Native C L I flaw that threatens the developer supply chain during scaffolding and close with United Kingdom carriers moving to block spoofed numbers that fuel vishing. Practical takeaways span leaders, defenders, and builders, with the narrated feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 06 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aba094a1/d5cffa4f.mp3" length="21471028" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>536</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web Panel flaw lands on the exploited-bugs list with urgent patch guidance. Rounding out the first half, we cover renewed “BadCandy” implants on Cisco routers—an edge risk that can quietly reroute traffic and blind monitoring if firmware and access paths lag.</p><p>Listeners will also hear how new U.S. sanctions aim to choke off laundering networks tied to North Korean cyber operations, SonicWall’s attribution of a September breach to a state actor that accessed firewall backups, and research on shapeshifting, model-assisted malware that burns indicators fast. We highlight a high-severity React Native C L I flaw that threatens the developer supply chain during scaffolding and close with United Kingdom carriers moving to block spoofed numbers that fuel vishing. Practical takeaways span leaders, defenders, and builders, with the narrated feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aba094a1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 5th, 2025</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Daily Cyber News – November 5th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5a898ef-637c-4f16-99e4-d2592b75a098</guid>
      <link>https://share.transistor.fm/s/783e35ee</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November fifth, twenty twenty-five. We open with trust problems inside everyday tools: researchers found Microsoft Teams flaws that enable impersonation and message edits, and Google Play’s defenses were skirted by dozens of malicious apps with tens of millions of installs. A separate disclosure from Nikkei highlights why collaboration hubs are high-value targets after attackers accessed a Slack workspace used by roughly seventeen thousand employees and partners. The rest of the rundown covers targeting of Cisco firewalls at the edge and a stealthy backdoor that hides its traffic inside common A I services.</p><p> </p><p>Listeners will hear concise, plain-English summaries of what happened, why it matters, and the real-world stakes for leaders and defenders. We stay practical—no jargon detours—so you can spot where approvals, identity, or mobile fleets carry the most risk today. If you lead teams, you’ll get straightforward signals to watch; if you defend networks, you’ll hear the mechanisms that matter. The daily narrated feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November fifth, twenty twenty-five. We open with trust problems inside everyday tools: researchers found Microsoft Teams flaws that enable impersonation and message edits, and Google Play’s defenses were skirted by dozens of malicious apps with tens of millions of installs. A separate disclosure from Nikkei highlights why collaboration hubs are high-value targets after attackers accessed a Slack workspace used by roughly seventeen thousand employees and partners. The rest of the rundown covers targeting of Cisco firewalls at the edge and a stealthy backdoor that hides its traffic inside common A I services.</p><p> </p><p>Listeners will hear concise, plain-English summaries of what happened, why it matters, and the real-world stakes for leaders and defenders. We stay practical—no jargon detours—so you can spot where approvals, identity, or mobile fleets carry the most risk today. If you lead teams, you’ll get straightforward signals to watch; if you defend networks, you’ll hear the mechanisms that matter. The daily narrated feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/783e35ee/40f7397d.mp3" length="24533428" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>613</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November fifth, twenty twenty-five. We open with trust problems inside everyday tools: researchers found Microsoft Teams flaws that enable impersonation and message edits, and Google Play’s defenses were skirted by dozens of malicious apps with tens of millions of installs. A separate disclosure from Nikkei highlights why collaboration hubs are high-value targets after attackers accessed a Slack workspace used by roughly seventeen thousand employees and partners. The rest of the rundown covers targeting of Cisco firewalls at the edge and a stealthy backdoor that hides its traffic inside common A I services.</p><p> </p><p>Listeners will hear concise, plain-English summaries of what happened, why it matters, and the real-world stakes for leaders and defenders. We stay practical—no jargon detours—so you can spot where approvals, identity, or mobile fleets carry the most risk today. If you lead teams, you’ll get straightforward signals to watch; if you defend networks, you’ll hear the mechanisms that matter. The daily narrated feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/783e35ee/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 4th, 2025</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Daily Cyber News – November 4th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41b23688-feed-47e9-adc8-27518b92dc5f</guid>
      <link>https://share.transistor.fm/s/24fdcb31</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 4th, 2025. The brief opens with rare criminal charges against security insiders allegedly aiding a ransomware crew, a major breach disclosure affecting more than ten million people, and a stealthy espionage campaign focused on defense networks. Together they highlight three pressure points for every organization: personal accountability in the security profession, third-party data risk at scale, and the quiet persistence tactics that blend into routine admin work. It’s a fast scan of what happened and why it matters without drowning you in jargon.</p><p> </p><p>You’ll hear concise updates you can act on: the scope of the indictments and what they signal for ethics programs, the Conduent notification posture and downstream fraud risk, and the “live off the land” tradecraft powering Operation SkyCloak. Leaders get clarity on policy moves and vendor oversight; defenders get concrete signals to hunt and the controls that change outcomes. It’s the same set of headlines you’ll find in the newsletter, with clean narration for your commute. The full daily feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 4th, 2025. The brief opens with rare criminal charges against security insiders allegedly aiding a ransomware crew, a major breach disclosure affecting more than ten million people, and a stealthy espionage campaign focused on defense networks. Together they highlight three pressure points for every organization: personal accountability in the security profession, third-party data risk at scale, and the quiet persistence tactics that blend into routine admin work. It’s a fast scan of what happened and why it matters without drowning you in jargon.</p><p> </p><p>You’ll hear concise updates you can act on: the scope of the indictments and what they signal for ethics programs, the Conduent notification posture and downstream fraud risk, and the “live off the land” tradecraft powering Operation SkyCloak. Leaders get clarity on policy moves and vendor oversight; defenders get concrete signals to hunt and the controls that change outcomes. It’s the same set of headlines you’ll find in the newsletter, with clean narration for your commute. The full daily feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Nov 2025 05:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/24fdcb31/12b22dc6.mp3" length="31484788" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>786</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 4th, 2025. The brief opens with rare criminal charges against security insiders allegedly aiding a ransomware crew, a major breach disclosure affecting more than ten million people, and a stealthy espionage campaign focused on defense networks. Together they highlight three pressure points for every organization: personal accountability in the security profession, third-party data risk at scale, and the quiet persistence tactics that blend into routine admin work. It’s a fast scan of what happened and why it matters without drowning you in jargon.</p><p> </p><p>You’ll hear concise updates you can act on: the scope of the indictments and what they signal for ethics programs, the Conduent notification posture and downstream fraud risk, and the “live off the land” tradecraft powering Operation SkyCloak. Leaders get clarity on policy moves and vendor oversight; defenders get concrete signals to hunt and the controls that change outcomes. It’s the same set of headlines you’ll find in the newsletter, with clean narration for your commute. The full daily feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/24fdcb31/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – November 3rd, 2025</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Daily Cyber News – November 3rd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">03bb85be-97fb-4cba-b650-773e2721e7e4</guid>
      <link>https://share.transistor.fm/s/1bc8be7e</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for November 3rd, 2025. Today’s brief opens with a suspected breach at a telecom gear vendor, a claimed donor data exposure tied to a major university, and an extradition linked to a high-impact ransomware crew. We then cover an update-server hijack that turns patches into malware delivery, persistent router implants, and a fast Chrome fix after in-the-wild attacks. Rounding out the lineup are a VMware item added to the known-exploited list, targeted Windows espionage against European diplomats, and a Linux kernel bug reused in recent break-ins.</p><p>Listeners will hear clear summaries of what happened, who is most at risk, and the current status across each story. Leaders get quick context for third-party risk, communications, and governance choices. Defenders hear concise details on mechanisms, from update workflows and management planes to browser engines and MDM connectors. The episode also touches on arrests and custody moves that may surface fresh indicators for hunts. The daily feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for November 3rd, 2025. Today’s brief opens with a suspected breach at a telecom gear vendor, a claimed donor data exposure tied to a major university, and an extradition linked to a high-impact ransomware crew. We then cover an update-server hijack that turns patches into malware delivery, persistent router implants, and a fast Chrome fix after in-the-wild attacks. Rounding out the lineup are a VMware item added to the known-exploited list, targeted Windows espionage against European diplomats, and a Linux kernel bug reused in recent break-ins.</p><p>Listeners will hear clear summaries of what happened, who is most at risk, and the current status across each story. Leaders get quick context for third-party risk, communications, and governance choices. Defenders hear concise details on mechanisms, from update workflows and management planes to browser engines and MDM connectors. The episode also touches on arrests and custody moves that may surface fresh indicators for hunts. The daily feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Nov 2025 04:00:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1bc8be7e/f5b1d646.mp3" length="18567028" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>463</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for November 3rd, 2025. Today’s brief opens with a suspected breach at a telecom gear vendor, a claimed donor data exposure tied to a major university, and an extradition linked to a high-impact ransomware crew. We then cover an update-server hijack that turns patches into malware delivery, persistent router implants, and a fast Chrome fix after in-the-wild attacks. Rounding out the lineup are a VMware item added to the known-exploited list, targeted Windows espionage against European diplomats, and a Linux kernel bug reused in recent break-ins.</p><p>Listeners will hear clear summaries of what happened, who is most at risk, and the current status across each story. Leaders get quick context for third-party risk, communications, and governance choices. Defenders hear concise details on mechanisms, from update workflows and management planes to browser engines and MDM connectors. The episode also touches on arrests and custody moves that may surface fresh indicators for hunts. The daily feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1bc8be7e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, October 31st, 2025</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Weekly Cyber News Rollup, October 31st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d052eaa-616d-4f6e-bf13-872d35086c89</guid>
      <link>https://share.transistor.fm/s/85483740</link>
      <description>
        <![CDATA[<p>This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands of resolvers. A live Chrome exploit tied to a surveillance vendor kept risk high for targeted users, and a rebuilt ransomware toolkit reappeared with broader reach. Together, these stories show how core plumbing, business systems, and user browsers can all become first-impact points.</p><p> </p><p>You will hear how agencies were ordered to patch exploited virtualization paths, how developer tokens were stolen via look-alike packages, and how a polished board-invite lure harvested executive credentials. We cover a Windows Subsystem for Linux encryptor tactic, active attacks on shop-floor software added to the K E V list, and hands-on tampering of exposed industrial controls. Also in the mix: a global identity outage, mass exploitation of abandoned plugins, near-field payment relay kits, an enclave side-channel, a crash-looping link, rumor control, and account-security policy changes. Leaders, defenders, and builders get practical takeaways, with the narrated episode available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands of resolvers. A live Chrome exploit tied to a surveillance vendor kept risk high for targeted users, and a rebuilt ransomware toolkit reappeared with broader reach. Together, these stories show how core plumbing, business systems, and user browsers can all become first-impact points.</p><p> </p><p>You will hear how agencies were ordered to patch exploited virtualization paths, how developer tokens were stolen via look-alike packages, and how a polished board-invite lure harvested executive credentials. We cover a Windows Subsystem for Linux encryptor tactic, active attacks on shop-floor software added to the K E V list, and hands-on tampering of exposed industrial controls. Also in the mix: a global identity outage, mass exploitation of abandoned plugins, near-field payment relay kits, an enclave side-channel, a crash-looping link, rumor control, and account-security policy changes. Leaders, defenders, and builders get practical takeaways, with the narrated episode available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 Oct 2025 06:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/85483740/dbcb504b.mp3" length="28763156" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>718</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands of resolvers. A live Chrome exploit tied to a surveillance vendor kept risk high for targeted users, and a rebuilt ransomware toolkit reappeared with broader reach. Together, these stories show how core plumbing, business systems, and user browsers can all become first-impact points.</p><p> </p><p>You will hear how agencies were ordered to patch exploited virtualization paths, how developer tokens were stolen via look-alike packages, and how a polished board-invite lure harvested executive credentials. We cover a Windows Subsystem for Linux encryptor tactic, active attacks on shop-floor software added to the K E V list, and hands-on tampering of exposed industrial controls. Also in the mix: a global identity outage, mass exploitation of abandoned plugins, near-field payment relay kits, an enclave side-channel, a crash-looping link, rumor control, and account-security policy changes. Leaders, defenders, and builders get practical takeaways, with the narrated episode available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/85483740/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 31st, 2025</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Daily Cyber News – October 31st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">564865e3-d2cf-4bba-ab0a-d1e7435085c2</guid>
      <link>https://share.transistor.fm/s/2d65afba</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a VMware Tools privilege bug, and hacktivists toggling exposed industrial control panels. The middle pack spans a telecom supplier’s long-dwell breach, potential F C C rule rollbacks, attacks on Windows update plumbing, Redis RediShell takeovers, and an npm supply-chain sweep. We close with developer risks, major breach notices, A I data poisoning, and two ransomware and mobile-forensics storylines.</p><p> </p><p>Leaders will hear the business stakes, third-party ripple effects, and which decisions cannot wait. Defenders get the operational tells: inbox rules and Open Authorization grants, browser crash telemetry, mobile relay behavior, Workspace ONE task anomalies, Redis module loads, and Adaptix C two post-exploitation patterns. Builders and platform teams will note dependency hygiene, extension governance, and provenance checks for retrieval pipelines. The Daily Brief is concise but practical—clear actions and signals to watch across cloud, identity, endpoint, and supply chain. A narrated version is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a VMware Tools privilege bug, and hacktivists toggling exposed industrial control panels. The middle pack spans a telecom supplier’s long-dwell breach, potential F C C rule rollbacks, attacks on Windows update plumbing, Redis RediShell takeovers, and an npm supply-chain sweep. We close with developer risks, major breach notices, A I data poisoning, and two ransomware and mobile-forensics storylines.</p><p> </p><p>Leaders will hear the business stakes, third-party ripple effects, and which decisions cannot wait. Defenders get the operational tells: inbox rules and Open Authorization grants, browser crash telemetry, mobile relay behavior, Workspace ONE task anomalies, Redis module loads, and Adaptix C two post-exploitation patterns. Builders and platform teams will note dependency hygiene, extension governance, and provenance checks for retrieval pipelines. The Daily Brief is concise but practical—clear actions and signals to watch across cloud, identity, endpoint, and supply chain. A narrated version is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2d65afba/206fe423.mp3" length="27195508" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>679</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a VMware Tools privilege bug, and hacktivists toggling exposed industrial control panels. The middle pack spans a telecom supplier’s long-dwell breach, potential F C C rule rollbacks, attacks on Windows update plumbing, Redis RediShell takeovers, and an npm supply-chain sweep. We close with developer risks, major breach notices, A I data poisoning, and two ransomware and mobile-forensics storylines.</p><p> </p><p>Leaders will hear the business stakes, third-party ripple effects, and which decisions cannot wait. Defenders get the operational tells: inbox rules and Open Authorization grants, browser crash telemetry, mobile relay behavior, Workspace ONE task anomalies, Redis module loads, and Adaptix C two post-exploitation patterns. Builders and platform teams will note dependency hygiene, extension governance, and provenance checks for retrieval pipelines. The Daily Brief is concise but practical—clear actions and signals to watch across cloud, identity, endpoint, and supply chain. A narrated version is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2d65afba/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 30th, 2025</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Daily Cyber News – October 30th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">019b8a0a-6bde-4850-ac80-82169c12358a</guid>
      <link>https://share.transistor.fm/s/73390ab3</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitation in factory software, a remote-code-execution flaw in XWiki driving cryptomining, and a coordinated wave of malicious Node Package Manager look-alikes harvesting tokens. The middle of the brief covered a four-terabyte backup exposure tied to a global consultancy, Android tap-to-pay relays, and a new leakage route from trusted enclaves on double data rate five hardware. We closed with botnets, stealthy espionage, plugin risk, regional cloud latency, data poisoning, and human-like Android malware.</p><p> </p><p>Listeners will hear concise, four-sentence rundowns that stick to what happened and why it matters. Leaders get signal on business continuity, vendor timelines, third-party exposure, and fraud risks; defenders hear the mechanisms that made each incident possible so they can tune detection and response. It’s a fast scan of operational realities across cloud control planes, software supply chains, industrial networks, and mobile threats—useful for morning stand-ups and afternoon triage. The narrated feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitation in factory software, a remote-code-execution flaw in XWiki driving cryptomining, and a coordinated wave of malicious Node Package Manager look-alikes harvesting tokens. The middle of the brief covered a four-terabyte backup exposure tied to a global consultancy, Android tap-to-pay relays, and a new leakage route from trusted enclaves on double data rate five hardware. We closed with botnets, stealthy espionage, plugin risk, regional cloud latency, data poisoning, and human-like Android malware.</p><p> </p><p>Listeners will hear concise, four-sentence rundowns that stick to what happened and why it matters. Leaders get signal on business continuity, vendor timelines, third-party exposure, and fraud risks; defenders hear the mechanisms that made each incident possible so they can tune detection and response. It’s a fast scan of operational realities across cloud control planes, software supply chains, industrial networks, and mobile threats—useful for morning stand-ups and afternoon triage. The narrated feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Oct 2025 22:40:51 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/73390ab3/c573cc9b.mp3" length="18386548" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>459</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitation in factory software, a remote-code-execution flaw in XWiki driving cryptomining, and a coordinated wave of malicious Node Package Manager look-alikes harvesting tokens. The middle of the brief covered a four-terabyte backup exposure tied to a global consultancy, Android tap-to-pay relays, and a new leakage route from trusted enclaves on double data rate five hardware. We closed with botnets, stealthy espionage, plugin risk, regional cloud latency, data poisoning, and human-like Android malware.</p><p> </p><p>Listeners will hear concise, four-sentence rundowns that stick to what happened and why it matters. Leaders get signal on business continuity, vendor timelines, third-party exposure, and fraud risks; defenders hear the mechanisms that made each incident possible so they can tune detection and response. It’s a fast scan of operational realities across cloud control planes, software supply chains, industrial networks, and mobile threats—useful for morning stand-ups and afternoon triage. The narrated feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/73390ab3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 29th, 2025</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Daily Cyber News – October 29th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f4b2702-7450-48fa-b91c-c6b436dc578d</guid>
      <link>https://share.transistor.fm/s/a5ac4fb9</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that runs Linux encryptors through Windows Subsystem for Linux, active exploitation in factory software tied to production lines, a marketing agency breach, record-scale denial-of-service bursts, mass attacks on popular WordPress plugins, a risky backup agent flaw, and remote takeovers of public wiki servers.</p><p>You’ll hear targeted campaigns against crypto and high-risk professionals, a Chrome zero-day linked to commercial spyware, two mobile banking threats that bypass fraud checks, and a third-party data claim involving a national grid operator. We round out with a massive marketing dataset exposure, a fast privilege-escalation bug in Ubuntu, Chrome’s move to warn on insecure HTTP by default, required re-enrollment for passkeys on a major social platform, and the commercial fallout from a vendor breach. The narrated feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that runs Linux encryptors through Windows Subsystem for Linux, active exploitation in factory software tied to production lines, a marketing agency breach, record-scale denial-of-service bursts, mass attacks on popular WordPress plugins, a risky backup agent flaw, and remote takeovers of public wiki servers.</p><p>You’ll hear targeted campaigns against crypto and high-risk professionals, a Chrome zero-day linked to commercial spyware, two mobile banking threats that bypass fraud checks, and a third-party data claim involving a national grid operator. We round out with a massive marketing dataset exposure, a fast privilege-escalation bug in Ubuntu, Chrome’s move to warn on insecure HTTP by default, required re-enrollment for passkeys on a major social platform, and the commercial fallout from a vendor breach. The narrated feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a5ac4fb9/de9aca21.mp3" length="19656628" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>491</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that runs Linux encryptors through Windows Subsystem for Linux, active exploitation in factory software tied to production lines, a marketing agency breach, record-scale denial-of-service bursts, mass attacks on popular WordPress plugins, a risky backup agent flaw, and remote takeovers of public wiki servers.</p><p>You’ll hear targeted campaigns against crypto and high-risk professionals, a Chrome zero-day linked to commercial spyware, two mobile banking threats that bypass fraud checks, and a third-party data claim involving a national grid operator. We round out with a massive marketing dataset exposure, a fast privilege-escalation bug in Ubuntu, Chrome’s move to warn on insecure HTTP by default, required re-enrollment for passkeys on a major social platform, and the commercial fallout from a vendor breach. The narrated feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a5ac4fb9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 28th, 2025</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Daily Cyber News – October 28th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cfa834da-fe6e-4126-aed0-029a919f0c25</guid>
      <link>https://share.transistor.fm/s/34af7797</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline to re-enroll security keys, raising access risks for brand accounts. Google also rushed a Chrome zero-day fix tied to a surveillance vendor, and Ubiquiti patched a flaw that could let attackers unlock doors—proof that identity, browsers, and building systems all intersect.</p><p>You’ll hear clear “what happened” briefs on backup agent risk at QNAP, long dwell time in Conduent’s breach, a Capitol Hill jobs portal exposure, and a UN cybercrime pact with privacy concerns. We cover falling ransomware payouts, Atlas browser memory abuse with ChatGPT, HyperRat Android spyware, North Korea’s refreshed tooling, LockBit 5’s resurgence, and mass attacks on outdated WordPress plugins. We close with holiday gift-card fraud, destructive Predatory Sparrow operations, Qilin’s BYOVD tactics, chatbot propaganda risks, and weak home-router passwords. Designed for leaders and defenders alike, the narrated feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline to re-enroll security keys, raising access risks for brand accounts. Google also rushed a Chrome zero-day fix tied to a surveillance vendor, and Ubiquiti patched a flaw that could let attackers unlock doors—proof that identity, browsers, and building systems all intersect.</p><p>You’ll hear clear “what happened” briefs on backup agent risk at QNAP, long dwell time in Conduent’s breach, a Capitol Hill jobs portal exposure, and a UN cybercrime pact with privacy concerns. We cover falling ransomware payouts, Atlas browser memory abuse with ChatGPT, HyperRat Android spyware, North Korea’s refreshed tooling, LockBit 5’s resurgence, and mass attacks on outdated WordPress plugins. We close with holiday gift-card fraud, destructive Predatory Sparrow operations, Qilin’s BYOVD tactics, chatbot propaganda risks, and weak home-router passwords. Designed for leaders and defenders alike, the narrated feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/34af7797/b8f0fa7a.mp3" length="22650868" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>565</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline to re-enroll security keys, raising access risks for brand accounts. Google also rushed a Chrome zero-day fix tied to a surveillance vendor, and Ubiquiti patched a flaw that could let attackers unlock doors—proof that identity, browsers, and building systems all intersect.</p><p>You’ll hear clear “what happened” briefs on backup agent risk at QNAP, long dwell time in Conduent’s breach, a Capitol Hill jobs portal exposure, and a UN cybercrime pact with privacy concerns. We cover falling ransomware payouts, Atlas browser memory abuse with ChatGPT, HyperRat Android spyware, North Korea’s refreshed tooling, LockBit 5’s resurgence, and mass attacks on outdated WordPress plugins. We close with holiday gift-card fraud, destructive Predatory Sparrow operations, Qilin’s BYOVD tactics, chatbot propaganda risks, and weak home-router passwords. Designed for leaders and defenders alike, the narrated feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/34af7797/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 27th, 2025</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Daily Cyber News – October 27th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8726b081-9de8-4941-899d-588b30ef6bf5</guid>
      <link>https://share.transistor.fm/s/a2a181b8</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payments. You’ll also hear how LockBit’s upgraded ransomware raises the stakes for virtualization hosts, and why mass exploitation of old WordPress plugins keeps taking small sites offline. Each segment explains impact in plain English and gives a next step you can act on today.</p><p>We then shift to developer and identity risks—from a Visual Studio Code supply-chain worm and Internet Information Services module hijacks, to LastPass “vault inheritance” lures and consent traps abusing Copilot Studio. Rounding out the brief: large-scale smishing infrastructure, fake “Telegram X” on Android, a Lazarus hiring lure against European drone makers, rapid “N-day” exploitation of SharePoint, Pwn2Own’s wave of new bugs, DDOS against Russia’s food tracking systems, edge-device flaws in TP-Link Omada and Festa VPN, malware distributed through YouTube videos, and ransomware claims against aviation. The daily feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payments. You’ll also hear how LockBit’s upgraded ransomware raises the stakes for virtualization hosts, and why mass exploitation of old WordPress plugins keeps taking small sites offline. Each segment explains impact in plain English and gives a next step you can act on today.</p><p>We then shift to developer and identity risks—from a Visual Studio Code supply-chain worm and Internet Information Services module hijacks, to LastPass “vault inheritance” lures and consent traps abusing Copilot Studio. Rounding out the brief: large-scale smishing infrastructure, fake “Telegram X” on Android, a Lazarus hiring lure against European drone makers, rapid “N-day” exploitation of SharePoint, Pwn2Own’s wave of new bugs, DDOS against Russia’s food tracking systems, edge-device flaws in TP-Link Omada and Festa VPN, malware distributed through YouTube videos, and ransomware claims against aviation. The daily feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a2a181b8/a5c30d1e.mp3" length="26816308" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>670</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payments. You’ll also hear how LockBit’s upgraded ransomware raises the stakes for virtualization hosts, and why mass exploitation of old WordPress plugins keeps taking small sites offline. Each segment explains impact in plain English and gives a next step you can act on today.</p><p>We then shift to developer and identity risks—from a Visual Studio Code supply-chain worm and Internet Information Services module hijacks, to LastPass “vault inheritance” lures and consent traps abusing Copilot Studio. Rounding out the brief: large-scale smishing infrastructure, fake “Telegram X” on Android, a Lazarus hiring lure against European drone makers, rapid “N-day” exploitation of SharePoint, Pwn2Own’s wave of new bugs, DDOS against Russia’s food tracking systems, edge-device flaws in TP-Link Omada and Festa VPN, malware distributed through YouTube videos, and ransomware claims against aviation. The daily feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a2a181b8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, October 24th, 2025</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Weekly Cyber News Rollup, October 24th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a183b246-2949-4867-8a49-59f467be5f91</guid>
      <link>https://share.transistor.fm/s/0268e9a2</link>
      <description>
        <![CDATA[<p>This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploitation against Oracle E-Business Suite, critical flaws in T P-Link Omada and WatchGuard Fireware, and convincing Microsoft 365 phishing hosted on Azure itself. Add in developer risks—from lagging Chromium inside A I code editors to a high-severity Kestrel bug—and the message is clear: fundamentals matter when everything is connected.</p><p>You’ll hear crisp, plain-English briefs on each item: how Magento “Session Reaper” drives checkout fraud, what Pwn two Own means for your next patch sprint, why Vidar’s speed boost and Mermaid-based prompt injection change identity defense, and how Polar Edge, ToolShell, and a Rust tar parsing flaw widen the perimeter. We also cover agent abuse, certificate subversion, and an M C P registry leak that exposed thousands of servers and keys. Leaders, defenders, and builders get concrete actions to reduce blast radius, tighten identity, and harden edge and dev tooling—available at daily cyber news dot com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploitation against Oracle E-Business Suite, critical flaws in T P-Link Omada and WatchGuard Fireware, and convincing Microsoft 365 phishing hosted on Azure itself. Add in developer risks—from lagging Chromium inside A I code editors to a high-severity Kestrel bug—and the message is clear: fundamentals matter when everything is connected.</p><p>You’ll hear crisp, plain-English briefs on each item: how Magento “Session Reaper” drives checkout fraud, what Pwn two Own means for your next patch sprint, why Vidar’s speed boost and Mermaid-based prompt injection change identity defense, and how Polar Edge, ToolShell, and a Rust tar parsing flaw widen the perimeter. We also cover agent abuse, certificate subversion, and an M C P registry leak that exposed thousands of servers and keys. Leaders, defenders, and builders get concrete actions to reduce blast radius, tighten identity, and harden edge and dev tooling—available at daily cyber news dot com.</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0268e9a2/3bbc6db4.mp3" length="40944596" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1023</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploitation against Oracle E-Business Suite, critical flaws in T P-Link Omada and WatchGuard Fireware, and convincing Microsoft 365 phishing hosted on Azure itself. Add in developer risks—from lagging Chromium inside A I code editors to a high-severity Kestrel bug—and the message is clear: fundamentals matter when everything is connected.</p><p>You’ll hear crisp, plain-English briefs on each item: how Magento “Session Reaper” drives checkout fraud, what Pwn two Own means for your next patch sprint, why Vidar’s speed boost and Mermaid-based prompt injection change identity defense, and how Polar Edge, ToolShell, and a Rust tar parsing flaw widen the perimeter. We also cover agent abuse, certificate subversion, and an M C P registry leak that exposed thousands of servers and keys. Leaders, defenders, and builders get concrete actions to reduce blast radius, tighten identity, and harden edge and dev tooling—available at daily cyber news dot com.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0268e9a2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 24th, 2025</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Daily Cyber News – October 24th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e304598-4991-4c3f-8ba0-c2c4180e14b4</guid>
      <link>https://share.transistor.fm/s/a83f0dfb</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked some laptops off Entra I D, underscoring identity fragility. And the Medusa gang claimed and leaked a large Comcast data cache after a failed ransom, raising the risk of phishing, account takeover, and regulatory scrutiny.</p><p>You’ll also hear how SpaceX cut connectivity to scam centers using Starlink; a “DreamJob” lure targeted drone engineers; Vidar Stealer 2.0 grabs tokens from memory; and malicious VS Code extensions threaten developer pipelines. Retail “Jingle Thief” gift-card fraud, a shift to high-conviction smishing, a Toys “R” Us Canada leak, and a Galaxy S25 contest compromise round out the middle. We close with China-linked telecom and energy intrusions, spoofed AI sidebars, a “privacy” browser acting like spyware, an NGO-focused PhantomCaptcha campaign, 183 million credentials added to Have I Been Pwned, Maryland’s statewide VDP, and an AI browser screenshot flaw—available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked some laptops off Entra I D, underscoring identity fragility. And the Medusa gang claimed and leaked a large Comcast data cache after a failed ransom, raising the risk of phishing, account takeover, and regulatory scrutiny.</p><p>You’ll also hear how SpaceX cut connectivity to scam centers using Starlink; a “DreamJob” lure targeted drone engineers; Vidar Stealer 2.0 grabs tokens from memory; and malicious VS Code extensions threaten developer pipelines. Retail “Jingle Thief” gift-card fraud, a shift to high-conviction smishing, a Toys “R” Us Canada leak, and a Galaxy S25 contest compromise round out the middle. We close with China-linked telecom and energy intrusions, spoofed AI sidebars, a “privacy” browser acting like spyware, an NGO-focused PhantomCaptcha campaign, 183 million credentials added to Have I Been Pwned, Maryland’s statewide VDP, and an AI browser screenshot flaw—available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a83f0dfb/f30717c1.mp3" length="30871348" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>771</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked some laptops off Entra I D, underscoring identity fragility. And the Medusa gang claimed and leaked a large Comcast data cache after a failed ransom, raising the risk of phishing, account takeover, and regulatory scrutiny.</p><p>You’ll also hear how SpaceX cut connectivity to scam centers using Starlink; a “DreamJob” lure targeted drone engineers; Vidar Stealer 2.0 grabs tokens from memory; and malicious VS Code extensions threaten developer pipelines. Retail “Jingle Thief” gift-card fraud, a shift to high-conviction smishing, a Toys “R” Us Canada leak, and a Galaxy S25 contest compromise round out the middle. We close with China-linked telecom and energy intrusions, spoofed AI sidebars, a “privacy” browser acting like spyware, an NGO-focused PhantomCaptcha campaign, 183 million credentials added to Have I Been Pwned, Maryland’s statewide VDP, and an AI browser screenshot flaw—available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a83f0dfb/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 23rd, 2025</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Daily Cyber News – October 23rd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c4ffbe9b-26c5-4440-96af-a177b038a083</guid>
      <link>https://share.transistor.fm/s/70bbba68</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle of the brief turns to policy and nation-state pressure, plus quick-hit updates on TP-Link gateways, GitLab patches, NuGet supply chain abuse, and a doxxing-driven slump in the Lumma stealer market.</p><p>Listeners will hear who’s most at risk in plain English and exactly what to watch—signals, not hand-waving. Leaders get priorities; defenders get one practical next step per story. We wrap with Pwn2Own takeaways, the ripple cost of JLR’s outage, OAuth persistence in cloud tenants, and a new EY datapoint that half of companies already feel AI security pain. The narrated version is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle of the brief turns to policy and nation-state pressure, plus quick-hit updates on TP-Link gateways, GitLab patches, NuGet supply chain abuse, and a doxxing-driven slump in the Lumma stealer market.</p><p>Listeners will hear who’s most at risk in plain English and exactly what to watch—signals, not hand-waving. Leaders get priorities; defenders get one practical next step per story. We wrap with Pwn2Own takeaways, the ripple cost of JLR’s outage, OAuth persistence in cloud tenants, and a new EY datapoint that half of companies already feel AI security pain. The narrated version is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/70bbba68/d2d7b7ec.mp3" length="30816628" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>770</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle of the brief turns to policy and nation-state pressure, plus quick-hit updates on TP-Link gateways, GitLab patches, NuGet supply chain abuse, and a doxxing-driven slump in the Lumma stealer market.</p><p>Listeners will hear who’s most at risk in plain English and exactly what to watch—signals, not hand-waving. Leaders get priorities; defenders get one practical next step per story. We wrap with Pwn2Own takeaways, the ripple cost of JLR’s outage, OAuth persistence in cloud tenants, and a new EY datapoint that half of companies already feel AI security pain. The narrated version is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/70bbba68/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 22nd, 2025</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Daily Cyber News – October 22nd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dcd78377-ea63-4357-9475-f4181f22c59b</guid>
      <link>https://share.transistor.fm/s/d34fd2c5</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Researchers flagged outdated Chromium builds inside popular AI code editors, and Pwn2Own’s opening day delivered a flood of zero-days. We also cover Vidar Stealer’s faster redesign, a Copilot prompt-injection trick, a fast-growing PolarEdge router botnet, and a Citrix-based breach of a European telecom..</p><p>You will also hear how captchas are being weaponized by Star Blizzard, why Apache Syncope needs immediate patching, and how a “better-auth” plugin bug enables silent API-key minting. We run through Apple devices added to CISA’s exploited list, Microsoft’s WinRE hotfix for recovery input, and a ransomware hit that paused Muji’s online shop. Rounding it out: malicious npm packages seeding AdaptixC2, APT36’s NIC-spoofing phish, the “Cavalry Werewolf” espionage campaign against industrial firms, and a stealthy SQL Server exfiltration wave. It is a crisp, plain-English briefing for leaders, defenders, and builders alike, available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Researchers flagged outdated Chromium builds inside popular AI code editors, and Pwn2Own’s opening day delivered a flood of zero-days. We also cover Vidar Stealer’s faster redesign, a Copilot prompt-injection trick, a fast-growing PolarEdge router botnet, and a Citrix-based breach of a European telecom..</p><p>You will also hear how captchas are being weaponized by Star Blizzard, why Apache Syncope needs immediate patching, and how a “better-auth” plugin bug enables silent API-key minting. We run through Apple devices added to CISA’s exploited list, Microsoft’s WinRE hotfix for recovery input, and a ransomware hit that paused Muji’s online shop. Rounding it out: malicious npm packages seeding AdaptixC2, APT36’s NIC-spoofing phish, the “Cavalry Werewolf” espionage campaign against industrial firms, and a stealthy SQL Server exfiltration wave. It is a crisp, plain-English briefing for leaders, defenders, and builders alike, available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d34fd2c5/35dcff0a.mp3" length="25278388" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>631</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Researchers flagged outdated Chromium builds inside popular AI code editors, and Pwn2Own’s opening day delivered a flood of zero-days. We also cover Vidar Stealer’s faster redesign, a Copilot prompt-injection trick, a fast-growing PolarEdge router botnet, and a Citrix-based breach of a European telecom..</p><p>You will also hear how captchas are being weaponized by Star Blizzard, why Apache Syncope needs immediate patching, and how a “better-auth” plugin bug enables silent API-key minting. We run through Apple devices added to CISA’s exploited list, Microsoft’s WinRE hotfix for recovery input, and a ransomware hit that paused Muji’s online shop. Rounding it out: malicious npm packages seeding AdaptixC2, APT36’s NIC-spoofing phish, the “Cavalry Werewolf” espionage campaign against industrial firms, and a stealthy SQL Server exfiltration wave. It is a crisp, plain-English briefing for leaders, defenders, and builders alike, available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d34fd2c5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 21st, 2025</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Daily Cyber News – October 21st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6c648c9a-9be0-41ba-8d53-1189ea3f3417</guid>
      <link>https://share.transistor.fm/s/c5b8fc71</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 21st, 2025. An AWS regional outage exposed hidden single-region dependencies, while CISA’s newest KEV entries pushed Oracle E-Business Suite to the front of many patch queues. We cover a supply-chain hit on developer ecosystems via “GlassWorm,” thousands of exposed WatchGuard firewalls, and a Windows SMB flaw now under active exploitation. Other stories include fallout from the F5 source-code theft, Windows recovery and smart-card breakages after October updates, a WSUS exploit proof-of-concept, and retail operations disrupted by supplier ransomware. The throughline: availability, identity, and third-party risk need fresh attention.</p><p>Listeners will hear concise five-sentence briefings for each story, with a plain-English impact statement, who’s most exposed, concrete signals to watch, and one practical next step. Leaders get clear decision prompts; defenders get operational tells they can check today. We also touch on DNS resolver changes in the EU, WhatsApp Web extension abuse, a UK defense contractor leak, an Android zero-click audio flaw, China’s allegations against the NSA, a targeted campaign using the “CAPI Backdoor,” a global SIM-fraud takedown, a tenant tool to find malicious OAuth apps, and a stealthy Windows persistence trick. The narrated feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 21st, 2025. An AWS regional outage exposed hidden single-region dependencies, while CISA’s newest KEV entries pushed Oracle E-Business Suite to the front of many patch queues. We cover a supply-chain hit on developer ecosystems via “GlassWorm,” thousands of exposed WatchGuard firewalls, and a Windows SMB flaw now under active exploitation. Other stories include fallout from the F5 source-code theft, Windows recovery and smart-card breakages after October updates, a WSUS exploit proof-of-concept, and retail operations disrupted by supplier ransomware. The throughline: availability, identity, and third-party risk need fresh attention.</p><p>Listeners will hear concise five-sentence briefings for each story, with a plain-English impact statement, who’s most exposed, concrete signals to watch, and one practical next step. Leaders get clear decision prompts; defenders get operational tells they can check today. We also touch on DNS resolver changes in the EU, WhatsApp Web extension abuse, a UK defense contractor leak, an Android zero-click audio flaw, China’s allegations against the NSA, a targeted campaign using the “CAPI Backdoor,” a global SIM-fraud takedown, a tenant tool to find malicious OAuth apps, and a stealthy Windows persistence trick. The narrated feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c5b8fc71/f66c5d40.mp3" length="33976948" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 21st, 2025. An AWS regional outage exposed hidden single-region dependencies, while CISA’s newest KEV entries pushed Oracle E-Business Suite to the front of many patch queues. We cover a supply-chain hit on developer ecosystems via “GlassWorm,” thousands of exposed WatchGuard firewalls, and a Windows SMB flaw now under active exploitation. Other stories include fallout from the F5 source-code theft, Windows recovery and smart-card breakages after October updates, a WSUS exploit proof-of-concept, and retail operations disrupted by supplier ransomware. The throughline: availability, identity, and third-party risk need fresh attention.</p><p>Listeners will hear concise five-sentence briefings for each story, with a plain-English impact statement, who’s most exposed, concrete signals to watch, and one practical next step. Leaders get clear decision prompts; defenders get operational tells they can check today. We also touch on DNS resolver changes in the EU, WhatsApp Web extension abuse, a UK defense contractor leak, an Android zero-click audio flaw, China’s allegations against the NSA, a targeted campaign using the “CAPI Backdoor,” a global SIM-fraud takedown, a tenant tool to find malicious OAuth apps, and a stealthy Windows persistence trick. The narrated feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Daily Cyber News – October 20th, 2025</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Daily Cyber News – October 20th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">78f955e6-9b53-43af-bc5a-1f711eb17c99</guid>
      <link>https://share.transistor.fm/s/3c90b78c</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 20th, 2025. Social platforms and trusted clouds drive the lead stories: “ClickFix” videos walking viewers into info-stealers, and Microsoft Azure Blob Storage abused to deliver convincing Microsoft 365 phishing. We also cover a critical WatchGuard VPN flaw, certificate abuse behind fake Teams installers, and Microsoft’s severe Kestrel request-smuggling fix. Rounding out the brief are vendor and platform risks (F5, ConnectWise, 7-Zip, Linux-PAM, Zimbra), targeted regional campaigns, large-scale fraud infrastructure, and enforcement wins. Each item translates impact into clear business actions.</p><p>Listeners will hear exactly what happened, why it matters to the business, who is most exposed, the signals to watch, and one practical next step for every headline. Leaders get crisp prioritization for identity, vendor exposure, and email fraud; defenders get detection cues for copy-paste tutorials, cloud-hosted phishing, appliance patching, and post-compromise elevation. It’s a fast, plain-English rundown you can act on today, with the narrated daily feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 20th, 2025. Social platforms and trusted clouds drive the lead stories: “ClickFix” videos walking viewers into info-stealers, and Microsoft Azure Blob Storage abused to deliver convincing Microsoft 365 phishing. We also cover a critical WatchGuard VPN flaw, certificate abuse behind fake Teams installers, and Microsoft’s severe Kestrel request-smuggling fix. Rounding out the brief are vendor and platform risks (F5, ConnectWise, 7-Zip, Linux-PAM, Zimbra), targeted regional campaigns, large-scale fraud infrastructure, and enforcement wins. Each item translates impact into clear business actions.</p><p>Listeners will hear exactly what happened, why it matters to the business, who is most exposed, the signals to watch, and one practical next step for every headline. Leaders get crisp prioritization for identity, vendor exposure, and email fraud; defenders get detection cues for copy-paste tutorials, cloud-hosted phishing, appliance patching, and post-compromise elevation. It’s a fast, plain-English rundown you can act on today, with the narrated daily feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3c90b78c/c123a670.mp3" length="30576628" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 20th, 2025. Social platforms and trusted clouds drive the lead stories: “ClickFix” videos walking viewers into info-stealers, and Microsoft Azure Blob Storage abused to deliver convincing Microsoft 365 phishing. We also cover a critical WatchGuard VPN flaw, certificate abuse behind fake Teams installers, and Microsoft’s severe Kestrel request-smuggling fix. Rounding out the brief are vendor and platform risks (F5, ConnectWise, 7-Zip, Linux-PAM, Zimbra), targeted regional campaigns, large-scale fraud infrastructure, and enforcement wins. Each item translates impact into clear business actions.</p><p>Listeners will hear exactly what happened, why it matters to the business, who is most exposed, the signals to watch, and one practical next step for every headline. Leaders get crisp prioritization for identity, vendor exposure, and email fraud; defenders get detection cues for copy-paste tutorials, cloud-hosted phishing, appliance patching, and post-compromise elevation. It’s a fast, plain-English rundown you can act on today, with the narrated daily feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3c90b78c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, October 17th, 2025</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Weekly Cyber News Rollup, October 17th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8a153abd-215d-492f-9f53-f10d9ac6a593</guid>
      <link>https://share.transistor.fm/s/1260ea7d</link>
      <description>
        <![CDATA[<p>The <em>Daily Cyber News— Friday Edition</em> is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, actionable update. For the week ending <strong>October 17th, 2025</strong>, we unpack everything from nation-state intrusions and zero-day exploits to record-setting DDoS attacks, policy moves, and vendor fallout — all explained in plain English for business leaders, defenders, and technology teams alike.</p><p>This week’s episode dives into <strong>F5’s confirmed breach</strong> where attackers stole BIG-IP source code and vulnerability data, the <strong>UK’s £14-million fine against Capita</strong> for poor breach response, and the discovery of a <strong>six-billion-record data leak</strong> from an unsecured Elasticsearch cluster. You’ll also hear how phishing campaigns spoofed <strong>LastPass and Bitwarden</strong> to install remote-control tools, why the massive <strong>“ClickFix” campaign</strong> tricked users into running malicious commands, and how <strong>Microsoft’s October patch cycle</strong> delivered 172 fixes — including six exploited zero-days — just as Windows 10 reached its support deadline.</p><p>We’ll explain how <strong>Chinese threat groups turned ArcGIS servers into backdoors</strong>, why <strong>VPNs and backup configurations became attacker blueprints</strong>, and how <strong>North Korea seeded npm with malicious packages</strong> to target developers. Plus, researchers exposed <strong>satellite traffic leaking unencrypted calls and telemetry</strong>, Apple doubled its <strong>bug bounty to $2 million</strong>, and the <strong>Aisuru botnet</strong> reached nearly thirty terabits per second in record-breaking denial-of-service floods.</p><p>Each story includes three things: what happened, why it matters, and one clear action you can take now. Whether you manage risk, run IT, or lead a security program, you’ll walk away knowing exactly where to focus your attention next week.</p><p>For more cybersecurity insights, visit <strong>BareMetalCyber.com</strong> for the full written wrap, or subscribe to the daily newsletter and podcast at <strong>DailyCyber.news</strong> — news you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The <em>Daily Cyber News— Friday Edition</em> is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, actionable update. For the week ending <strong>October 17th, 2025</strong>, we unpack everything from nation-state intrusions and zero-day exploits to record-setting DDoS attacks, policy moves, and vendor fallout — all explained in plain English for business leaders, defenders, and technology teams alike.</p><p>This week’s episode dives into <strong>F5’s confirmed breach</strong> where attackers stole BIG-IP source code and vulnerability data, the <strong>UK’s £14-million fine against Capita</strong> for poor breach response, and the discovery of a <strong>six-billion-record data leak</strong> from an unsecured Elasticsearch cluster. You’ll also hear how phishing campaigns spoofed <strong>LastPass and Bitwarden</strong> to install remote-control tools, why the massive <strong>“ClickFix” campaign</strong> tricked users into running malicious commands, and how <strong>Microsoft’s October patch cycle</strong> delivered 172 fixes — including six exploited zero-days — just as Windows 10 reached its support deadline.</p><p>We’ll explain how <strong>Chinese threat groups turned ArcGIS servers into backdoors</strong>, why <strong>VPNs and backup configurations became attacker blueprints</strong>, and how <strong>North Korea seeded npm with malicious packages</strong> to target developers. Plus, researchers exposed <strong>satellite traffic leaking unencrypted calls and telemetry</strong>, Apple doubled its <strong>bug bounty to $2 million</strong>, and the <strong>Aisuru botnet</strong> reached nearly thirty terabits per second in record-breaking denial-of-service floods.</p><p>Each story includes three things: what happened, why it matters, and one clear action you can take now. Whether you manage risk, run IT, or lead a security program, you’ll walk away knowing exactly where to focus your attention next week.</p><p>For more cybersecurity insights, visit <strong>BareMetalCyber.com</strong> for the full written wrap, or subscribe to the daily newsletter and podcast at <strong>DailyCyber.news</strong> — news you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Oct 2025 04:15:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1260ea7d/6421ed80.mp3" length="27291476" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>681</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The <em>Daily Cyber News— Friday Edition</em> is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, actionable update. For the week ending <strong>October 17th, 2025</strong>, we unpack everything from nation-state intrusions and zero-day exploits to record-setting DDoS attacks, policy moves, and vendor fallout — all explained in plain English for business leaders, defenders, and technology teams alike.</p><p>This week’s episode dives into <strong>F5’s confirmed breach</strong> where attackers stole BIG-IP source code and vulnerability data, the <strong>UK’s £14-million fine against Capita</strong> for poor breach response, and the discovery of a <strong>six-billion-record data leak</strong> from an unsecured Elasticsearch cluster. You’ll also hear how phishing campaigns spoofed <strong>LastPass and Bitwarden</strong> to install remote-control tools, why the massive <strong>“ClickFix” campaign</strong> tricked users into running malicious commands, and how <strong>Microsoft’s October patch cycle</strong> delivered 172 fixes — including six exploited zero-days — just as Windows 10 reached its support deadline.</p><p>We’ll explain how <strong>Chinese threat groups turned ArcGIS servers into backdoors</strong>, why <strong>VPNs and backup configurations became attacker blueprints</strong>, and how <strong>North Korea seeded npm with malicious packages</strong> to target developers. Plus, researchers exposed <strong>satellite traffic leaking unencrypted calls and telemetry</strong>, Apple doubled its <strong>bug bounty to $2 million</strong>, and the <strong>Aisuru botnet</strong> reached nearly thirty terabits per second in record-breaking denial-of-service floods.</p><p>Each story includes three things: what happened, why it matters, and one clear action you can take now. Whether you manage risk, run IT, or lead a security program, you’ll walk away knowing exactly where to focus your attention next week.</p><p>For more cybersecurity insights, visit <strong>BareMetalCyber.com</strong> for the full written wrap, or subscribe to the daily newsletter and podcast at <strong>DailyCyber.news</strong> — news you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1260ea7d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 17th, 2025</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Daily Cyber News – October 17th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d2820b7a-fd34-49b3-914d-651bf9b22279</guid>
      <link>https://share.transistor.fm/s/11b1aa38</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 17th, 2025. Today’s brief tracks rising pressure on edge security and third-party risk: lawmakers want clearer answers from Cisco on zero-day firewalls, while Microsoft’s certificate purge aims to blunt Teams-delivered lures. On offense, North Korea hides malware in blockchain contracts and ships Trojanized “job tests,” while rootkits and loaders push deeper into Linux and mid-market Windows fleets. Critical software keeps the spotlight—Adobe Experience Manager Forms lands on the Known Exploited list, a CentreStack zero-day gets patched after live abuse, and an actively exploited Windows privilege escalation shortens the path from foothold to domain control. Data exposure remains costly and broad, from a 17.6-million-record fintech breach to a 40-billion-record email vendor leak and a Sotheby’s incident affecting high-net-worth clients.</p><p>You’ll hear concise, five-sentence rundowns for each story with the business why, who’s most exposed, concrete signals to watch, and a practical next step. Leaders get decision cues on patch lanes, vendor oversight, and fraud budgets; defenders get operational tells—from odd SNMP sets and web-shell writes to eBPF attachments and signed MSI abuse—that shorten detection time. We also cover brand impersonation via old “user:pass@” links, SEO-poisoned “Ivanti VPN” downloads, the PhantomVAI loader’s rotating payloads, “Silk Lure” and ValleyRAT persistence, China-linked “Jewelbug” inside a Russian MSP, Mango’s vendor breach, and leaked secrets in Visual Studio Code extensions. It’s a fast, executive-friendly pass designed to help you decide and act, available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 17th, 2025. Today’s brief tracks rising pressure on edge security and third-party risk: lawmakers want clearer answers from Cisco on zero-day firewalls, while Microsoft’s certificate purge aims to blunt Teams-delivered lures. On offense, North Korea hides malware in blockchain contracts and ships Trojanized “job tests,” while rootkits and loaders push deeper into Linux and mid-market Windows fleets. Critical software keeps the spotlight—Adobe Experience Manager Forms lands on the Known Exploited list, a CentreStack zero-day gets patched after live abuse, and an actively exploited Windows privilege escalation shortens the path from foothold to domain control. Data exposure remains costly and broad, from a 17.6-million-record fintech breach to a 40-billion-record email vendor leak and a Sotheby’s incident affecting high-net-worth clients.</p><p>You’ll hear concise, five-sentence rundowns for each story with the business why, who’s most exposed, concrete signals to watch, and a practical next step. Leaders get decision cues on patch lanes, vendor oversight, and fraud budgets; defenders get operational tells—from odd SNMP sets and web-shell writes to eBPF attachments and signed MSI abuse—that shorten detection time. We also cover brand impersonation via old “user:pass@” links, SEO-poisoned “Ivanti VPN” downloads, the PhantomVAI loader’s rotating payloads, “Silk Lure” and ValleyRAT persistence, China-linked “Jewelbug” inside a Russian MSP, Mango’s vendor breach, and leaked secrets in Visual Studio Code extensions. It’s a fast, executive-friendly pass designed to help you decide and act, available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/11b1aa38/5910d44a.mp3" length="21069748" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>526</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 17th, 2025. Today’s brief tracks rising pressure on edge security and third-party risk: lawmakers want clearer answers from Cisco on zero-day firewalls, while Microsoft’s certificate purge aims to blunt Teams-delivered lures. On offense, North Korea hides malware in blockchain contracts and ships Trojanized “job tests,” while rootkits and loaders push deeper into Linux and mid-market Windows fleets. Critical software keeps the spotlight—Adobe Experience Manager Forms lands on the Known Exploited list, a CentreStack zero-day gets patched after live abuse, and an actively exploited Windows privilege escalation shortens the path from foothold to domain control. Data exposure remains costly and broad, from a 17.6-million-record fintech breach to a 40-billion-record email vendor leak and a Sotheby’s incident affecting high-net-worth clients.</p><p>You’ll hear concise, five-sentence rundowns for each story with the business why, who’s most exposed, concrete signals to watch, and a practical next step. Leaders get decision cues on patch lanes, vendor oversight, and fraud budgets; defenders get operational tells—from odd SNMP sets and web-shell writes to eBPF attachments and signed MSI abuse—that shorten detection time. We also cover brand impersonation via old “user:pass@” links, SEO-poisoned “Ivanti VPN” downloads, the PhantomVAI loader’s rotating payloads, “Silk Lure” and ValleyRAT persistence, China-linked “Jewelbug” inside a Russian MSP, Mango’s vendor breach, and leaked secrets in Visual Studio Code extensions. It’s a fast, executive-friendly pass designed to help you decide and act, available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/11b1aa38/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 16th, 2025</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Daily Cyber News – October 16th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">61c78bf5-ad58-4039-b21b-d2619b1de482</guid>
      <link>https://share.transistor.fm/s/1189541e</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 16th, 2025. F5 confirmed a nation-state breach with BIG-IP source code and vulnerability research stolen, while the U.K.’s regulator fined Capita £14 million for its 2023 data breach. We covered a massive misconfigured Elasticsearch cache exposing six billion records, evolving social engineering that impersonates password managers and the “ClickFix” copy-paste lure, and a third-party breach at MANGO. Critical risk items include SAP NetWeaver remote code execution, leaked tokens in 100+ VS Code extensions, and Secure Boot bypass risks on Framework laptops. Advanced adversary activity featured Jewelbug at a Russian IT provider and Flax Typhoon’s long-term ArcGIS abuse, alongside OT and telecom warnings on Red Lion RTUs and active exploitation of ICTBroadcast. We also discussed job-offer phishing against Google Workspace and Microsoft 365, GhostBat Android banking theft in India, a four-year sentence in the PowerSchool case, the Qilin ransomware operation, and the rise of board-level AI and cyber oversight.</p><p>Listeners will hear concise, plain-English summaries plus who’s most exposed and a practical next step for each story—useful for leaders prioritizing risk, defenders tuning controls, and builders shoring up pipelines. It’s a fast way to stay briefed on supplier breaches, patch-now vulnerabilities, cloud identity threats, OT device flaws, and shifting governance expectations. The narrated edition is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 16th, 2025. F5 confirmed a nation-state breach with BIG-IP source code and vulnerability research stolen, while the U.K.’s regulator fined Capita £14 million for its 2023 data breach. We covered a massive misconfigured Elasticsearch cache exposing six billion records, evolving social engineering that impersonates password managers and the “ClickFix” copy-paste lure, and a third-party breach at MANGO. Critical risk items include SAP NetWeaver remote code execution, leaked tokens in 100+ VS Code extensions, and Secure Boot bypass risks on Framework laptops. Advanced adversary activity featured Jewelbug at a Russian IT provider and Flax Typhoon’s long-term ArcGIS abuse, alongside OT and telecom warnings on Red Lion RTUs and active exploitation of ICTBroadcast. We also discussed job-offer phishing against Google Workspace and Microsoft 365, GhostBat Android banking theft in India, a four-year sentence in the PowerSchool case, the Qilin ransomware operation, and the rise of board-level AI and cyber oversight.</p><p>Listeners will hear concise, plain-English summaries plus who’s most exposed and a practical next step for each story—useful for leaders prioritizing risk, defenders tuning controls, and builders shoring up pipelines. It’s a fast way to stay briefed on supplier breaches, patch-now vulnerabilities, cloud identity threats, OT device flaws, and shifting governance expectations. The narrated edition is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 16 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1189541e/b3ac36d9.mp3" length="31268788" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>781</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 16th, 2025. F5 confirmed a nation-state breach with BIG-IP source code and vulnerability research stolen, while the U.K.’s regulator fined Capita £14 million for its 2023 data breach. We covered a massive misconfigured Elasticsearch cache exposing six billion records, evolving social engineering that impersonates password managers and the “ClickFix” copy-paste lure, and a third-party breach at MANGO. Critical risk items include SAP NetWeaver remote code execution, leaked tokens in 100+ VS Code extensions, and Secure Boot bypass risks on Framework laptops. Advanced adversary activity featured Jewelbug at a Russian IT provider and Flax Typhoon’s long-term ArcGIS abuse, alongside OT and telecom warnings on Red Lion RTUs and active exploitation of ICTBroadcast. We also discussed job-offer phishing against Google Workspace and Microsoft 365, GhostBat Android banking theft in India, a four-year sentence in the PowerSchool case, the Qilin ransomware operation, and the rise of board-level AI and cyber oversight.</p><p>Listeners will hear concise, plain-English summaries plus who’s most exposed and a practical next step for each story—useful for leaders prioritizing risk, defenders tuning controls, and builders shoring up pipelines. It’s a fast way to stay briefed on supplier breaches, patch-now vulnerabilities, cloud identity threats, OT device flaws, and shifting governance expectations. The narrated edition is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1189541e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 15th, 2025</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Daily Cyber News – October 15th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5752e358-b4c8-4e51-879c-c299376d3250</guid>
      <link>https://share.transistor.fm/s/6f843072</link>
      <description>
        <![CDATA[<p>October 15th, 2025. This is today’s cyber news for October 15th, 2025. We lead with new research showing widespread eavesdropping risk on geostationary satellite traffic, then pivot to Microsoft’s heavy Patch Tuesday and the end of free support for Windows 10. You’ll also hear how the U.K. is grappling with a sharp rise in nationally significant incidents, why a no-permission “Pixnapping” side channel on Android puts on-screen codes at risk, and how a China-nexus group quietly turned ArcGIS Server into a long-term backdoor. The thread: attackers exploiting blind spots—infrastructure we assumed was safe, legacy tech, and overlooked supply chains.</p><p> </p><p>Across the rest of the brief, we cover firmware and cloud trust cracks (Secure Boot shells on Framework laptops, “RMPocalypse” undermining AMD SEV-SNP), developer-ecosystem threats (tainted VS Code extensions, npm/PyPI/RubyGems exfil, unpkg-abusing phishing), and brute-force pressure from a 100K-node RDP botnet. We address Fortinet flaws, Microsoft’s curbs on Edge IE Mode, a record $15B seizure against pig-butchering scammers, Exchange 2016/2019 end-of-support, Astaroth’s steganography, TA585’s layered delivery, OpenAI-brand phish, and the “PolarEdge” IoT backdoor. The narrated daily is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>October 15th, 2025. This is today’s cyber news for October 15th, 2025. We lead with new research showing widespread eavesdropping risk on geostationary satellite traffic, then pivot to Microsoft’s heavy Patch Tuesday and the end of free support for Windows 10. You’ll also hear how the U.K. is grappling with a sharp rise in nationally significant incidents, why a no-permission “Pixnapping” side channel on Android puts on-screen codes at risk, and how a China-nexus group quietly turned ArcGIS Server into a long-term backdoor. The thread: attackers exploiting blind spots—infrastructure we assumed was safe, legacy tech, and overlooked supply chains.</p><p> </p><p>Across the rest of the brief, we cover firmware and cloud trust cracks (Secure Boot shells on Framework laptops, “RMPocalypse” undermining AMD SEV-SNP), developer-ecosystem threats (tainted VS Code extensions, npm/PyPI/RubyGems exfil, unpkg-abusing phishing), and brute-force pressure from a 100K-node RDP botnet. We address Fortinet flaws, Microsoft’s curbs on Edge IE Mode, a record $15B seizure against pig-butchering scammers, Exchange 2016/2019 end-of-support, Astaroth’s steganography, TA585’s layered delivery, OpenAI-brand phish, and the “PolarEdge” IoT backdoor. The narrated daily is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6f843072/d415a0d1.mp3" length="29871988" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>746</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>October 15th, 2025. This is today’s cyber news for October 15th, 2025. We lead with new research showing widespread eavesdropping risk on geostationary satellite traffic, then pivot to Microsoft’s heavy Patch Tuesday and the end of free support for Windows 10. You’ll also hear how the U.K. is grappling with a sharp rise in nationally significant incidents, why a no-permission “Pixnapping” side channel on Android puts on-screen codes at risk, and how a China-nexus group quietly turned ArcGIS Server into a long-term backdoor. The thread: attackers exploiting blind spots—infrastructure we assumed was safe, legacy tech, and overlooked supply chains.</p><p> </p><p>Across the rest of the brief, we cover firmware and cloud trust cracks (Secure Boot shells on Framework laptops, “RMPocalypse” undermining AMD SEV-SNP), developer-ecosystem threats (tainted VS Code extensions, npm/PyPI/RubyGems exfil, unpkg-abusing phishing), and brute-force pressure from a 100K-node RDP botnet. We address Fortinet flaws, Microsoft’s curbs on Edge IE Mode, a record $15B seizure against pig-butchering scammers, Exchange 2016/2019 end-of-support, Astaroth’s steganography, TA585’s layered delivery, OpenAI-brand phish, and the “PolarEdge” IoT backdoor. The narrated daily is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f843072/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 14th, 2025</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Daily Cyber News – October 14th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">637cd291-d188-4c27-b22b-2fc2d8a176e9</guid>
      <link>https://share.transistor.fm/s/70ff6e2b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botnet brute-forcing RDP from more than one hundred thousand IPs. We also track an aggressive North Korea–linked npm poisoning wave aimed at developers and Web3 teams.</p><p> </p><p>Listeners will hear what happened, what it means, and the single best next step for leaders and defenders—story by story. We dig into supply-chain risks (Axis Revit plugin secrets, Unity’s SpeedTree skimmer), healthcare breach impact (SimonMed), cloud reliability (Microsoft 365 outage), and deep-tech shifts (RMPocalypse against AMD SEV-SNP). If you lead, defend, or build, this daily, narrative brief is for you—available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botnet brute-forcing RDP from more than one hundred thousand IPs. We also track an aggressive North Korea–linked npm poisoning wave aimed at developers and Web3 teams.</p><p> </p><p>Listeners will hear what happened, what it means, and the single best next step for leaders and defenders—story by story. We dig into supply-chain risks (Axis Revit plugin secrets, Unity’s SpeedTree skimmer), healthcare breach impact (SimonMed), cloud reliability (Microsoft 365 outage), and deep-tech shifts (RMPocalypse against AMD SEV-SNP). If you lead, defend, or build, this daily, narrative brief is for you—available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/70ff6e2b/02380de4.mp3" length="62031988" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1550</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botnet brute-forcing RDP from more than one hundred thousand IPs. We also track an aggressive North Korea–linked npm poisoning wave aimed at developers and Web3 teams.</p><p> </p><p>Listeners will hear what happened, what it means, and the single best next step for leaders and defenders—story by story. We dig into supply-chain risks (Axis Revit plugin secrets, Unity’s SpeedTree skimmer), healthcare breach impact (SimonMed), cloud reliability (Microsoft 365 outage), and deep-tech shifts (RMPocalypse against AMD SEV-SNP). If you lead, defend, or build, this daily, narrative brief is for you—available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/70ff6e2b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Trailer</title>
      <itunes:title>Trailer</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">3adf34c9-068c-4387-8655-8d74b92caa79</guid>
      <link>https://share.transistor.fm/s/aa0cfcc0</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 23:21:24 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aa0cfcc0/e7ba0df8.mp3" length="694039" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>87</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Daily Cyber News – October 13th, 2025</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Daily Cyber News – October 13th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2012d030-d496-4007-a8de-bba46468b1d8</guid>
      <link>https://share.transistor.fm/s/adad647f</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~30 Tbps “Aisuru” DDoS, and Apple doubling its top bug bounty to reshape exploit economics. Rounding out the day: payroll fraud via HR SaaS, poisoned npm packages, a GoAnywhere exploitation timeline, threat actors abusing Velociraptor, and high-volume smishing in New York—plus higher-ed extortion claims, KEV-listed Grafana risk, Windows 11 23H2 end-of-support, and more.</p><p>Listeners will hear clear, plain-English walk-throughs of what happened, why it matters, and exactly what to do next. It’s designed for leaders who need decisions, defenders who need signals to watch, and builders who keep pipelines safe—covering WordPress auth bypass, massive RDP probing, stealer campaigns packed with Node.js single executables, a phishing-as-a-service takedown in Spain, VirusTotal policy changes, a second Oracle EBS exposure, and Ukraine’s warning on AI-assisted attacks. There’s a narrated daily feed available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~30 Tbps “Aisuru” DDoS, and Apple doubling its top bug bounty to reshape exploit economics. Rounding out the day: payroll fraud via HR SaaS, poisoned npm packages, a GoAnywhere exploitation timeline, threat actors abusing Velociraptor, and high-volume smishing in New York—plus higher-ed extortion claims, KEV-listed Grafana risk, Windows 11 23H2 end-of-support, and more.</p><p>Listeners will hear clear, plain-English walk-throughs of what happened, why it matters, and exactly what to do next. It’s designed for leaders who need decisions, defenders who need signals to watch, and builders who keep pipelines safe—covering WordPress auth bypass, massive RDP probing, stealer campaigns packed with Node.js single executables, a phishing-as-a-service takedown in Spain, VirusTotal policy changes, a second Oracle EBS exposure, and Ukraine’s warning on AI-assisted attacks. There’s a narrated daily feed available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 03:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/adad647f/8964ee0a.mp3" length="71949748" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~30 Tbps “Aisuru” DDoS, and Apple doubling its top bug bounty to reshape exploit economics. Rounding out the day: payroll fraud via HR SaaS, poisoned npm packages, a GoAnywhere exploitation timeline, threat actors abusing Velociraptor, and high-volume smishing in New York—plus higher-ed extortion claims, KEV-listed Grafana risk, Windows 11 23H2 end-of-support, and more.</p><p>Listeners will hear clear, plain-English walk-throughs of what happened, why it matters, and exactly what to do next. It’s designed for leaders who need decisions, defenders who need signals to watch, and builders who keep pipelines safe—covering WordPress auth bypass, massive RDP probing, stealer campaigns packed with Node.js single executables, a phishing-as-a-service takedown in Spain, VirusTotal policy changes, a second Oracle EBS exposure, and Ukraine’s warning on AI-assisted attacks. There’s a narrated daily feed available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/adad647f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 10th, 2025</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Daily Cyber News – October 10th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cbbca7e3-461a-43f9-b795-b4e8d9270bc8</guid>
      <link>https://share.transistor.fm/s/8fccd81c</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 10th, 2025. Today’s brief leads with SonicWall confirming its cloud firewall backups were accessed for all users of its backup service—turning configuration data into a roadmap for attackers. We also cover an actively exploited WordPress authentication bypass, an Android spyware family impersonating WhatsApp and TikTok, and Microsoft 365 disruptions tied to an Azure Front Door issue. Rounding out the first half: university “payroll pirate” attacks that reroute salaries via compromised HR accounts.</p><p>You’ll also hear how a new botnet shotguns 50+ n-day bugs, why ransomware crews are abusing the Velociraptor DFIR tool, Discord’s clarification on a third-party support breach of 70,000 ID photos, malvertising that drops the “Oyster” backdoor via fake Teams installers, and a ClickFix variant using cache smuggling. We finish with a polymorphic Python RAT, a faster “Chaos-C++” ransomware strain, signs that Warlock ransomware may have state ties, QR-based quishing, risky AI browsers with OAuth exposure, a Defender bug mislabeling SQL Server as EOL, a claimed KFC Venezuela data sale, and the big SaaS lesson: token hygiene. Available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 10th, 2025. Today’s brief leads with SonicWall confirming its cloud firewall backups were accessed for all users of its backup service—turning configuration data into a roadmap for attackers. We also cover an actively exploited WordPress authentication bypass, an Android spyware family impersonating WhatsApp and TikTok, and Microsoft 365 disruptions tied to an Azure Front Door issue. Rounding out the first half: university “payroll pirate” attacks that reroute salaries via compromised HR accounts.</p><p>You’ll also hear how a new botnet shotguns 50+ n-day bugs, why ransomware crews are abusing the Velociraptor DFIR tool, Discord’s clarification on a third-party support breach of 70,000 ID photos, malvertising that drops the “Oyster” backdoor via fake Teams installers, and a ClickFix variant using cache smuggling. We finish with a polymorphic Python RAT, a faster “Chaos-C++” ransomware strain, signs that Warlock ransomware may have state ties, QR-based quishing, risky AI browsers with OAuth exposure, a Defender bug mislabeling SQL Server as EOL, a claimed KFC Venezuela data sale, and the big SaaS lesson: token hygiene. Available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8fccd81c/6b0db97f.mp3" length="50801908" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1269</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 10th, 2025. Today’s brief leads with SonicWall confirming its cloud firewall backups were accessed for all users of its backup service—turning configuration data into a roadmap for attackers. We also cover an actively exploited WordPress authentication bypass, an Android spyware family impersonating WhatsApp and TikTok, and Microsoft 365 disruptions tied to an Azure Front Door issue. Rounding out the first half: university “payroll pirate” attacks that reroute salaries via compromised HR accounts.</p><p>You’ll also hear how a new botnet shotguns 50+ n-day bugs, why ransomware crews are abusing the Velociraptor DFIR tool, Discord’s clarification on a third-party support breach of 70,000 ID photos, malvertising that drops the “Oyster” backdoor via fake Teams installers, and a ClickFix variant using cache smuggling. We finish with a polymorphic Python RAT, a faster “Chaos-C++” ransomware strain, signs that Warlock ransomware may have state ties, QR-based quishing, risky AI browsers with OAuth exposure, a Defender bug mislabeling SQL Server as EOL, a claimed KFC Venezuela data sale, and the big SaaS lesson: token hygiene. Available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8fccd81c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Weekly Cyber News Rollup, October 10th, 2025</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Weekly Cyber News Rollup, October 10th, 2025</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">4460c937-b61d-4a88-9efa-d5eed1ba5664</guid>
      <link>https://share.transistor.fm/s/23ef4ed6</link>
      <description>
        <![CDATA[<p>This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting customer exports, and active exploitation against Oracle E-Business Suite. We also cover a critical Redis flaw with app-wide blast radius, Cisco edge firewall abuse with public exploit code, Zimbra’s KEV-listed email bug, GoAnywhere MFT ransomware activity, mass scanning of Palo Alto VPN portals, and a UnityVSA bug that threatens backups.</p><p>In plain English, you’ll hear why these stories matter for the business, who’s most exposed, the single action to take next, and what to watch next week. Perfect for leaders who need decisions, and defenders who need a checklist.</p><p>Subscribe for the daily brief and share this episode with your incident lead before Monday’s stand-up.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting customer exports, and active exploitation against Oracle E-Business Suite. We also cover a critical Redis flaw with app-wide blast radius, Cisco edge firewall abuse with public exploit code, Zimbra’s KEV-listed email bug, GoAnywhere MFT ransomware activity, mass scanning of Palo Alto VPN portals, and a UnityVSA bug that threatens backups.</p><p>In plain English, you’ll hear why these stories matter for the business, who’s most exposed, the single action to take next, and what to watch next week. Perfect for leaders who need decisions, and defenders who need a checklist.</p><p>Subscribe for the daily brief and share this episode with your incident lead before Monday’s stand-up.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/23ef4ed6/8daf02d2.mp3" length="41603156" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1039</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting customer exports, and active exploitation against Oracle E-Business Suite. We also cover a critical Redis flaw with app-wide blast radius, Cisco edge firewall abuse with public exploit code, Zimbra’s KEV-listed email bug, GoAnywhere MFT ransomware activity, mass scanning of Palo Alto VPN portals, and a UnityVSA bug that threatens backups.</p><p>In plain English, you’ll hear why these stories matter for the business, who’s most exposed, the single action to take next, and what to watch next week. Perfect for leaders who need decisions, and defenders who need a checklist.</p><p>Subscribe for the daily brief and share this episode with your incident lead before Monday’s stand-up.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/23ef4ed6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 9th, 2025</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Daily Cyber News – October 9th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4dab19f3-e336-4f32-b260-96a8022df6c6</guid>
      <link>https://share.transistor.fm/s/140ff45b</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 9th, 2025. A new cloud-focused extortion crew targets AWS, a three-way ransomware alliance promises faster, louder campaigns, and Qilin pressures Asahi with leaked data. We cover a coordinated push against Salesforce tenants by a “Scattered Lapsus$ Hunters” collective and a Microsoft 365 outage that rippled through Teams and Exchange. Rounding out the brief: urgent fixes for a Redis Lua flaw, an MCP plugin risk in Figma workflows, mass exploitation of a WordPress theme, cache-smuggling “FileFix” lures, and Chinese operators using Nezha to drop Gh0st RAT—plus Mustang Panda tradecraft, malware-less database raids, Salesforce’s refusal to pay, UK arrests in a childcare dox case, a DraftKings ATO wave, and a new Android RAT on GitHub.</p><p> </p><p>Listeners will hear what happened, what it means, and one crisp recommendation per story—built for executives who need decisions and defenders who need next steps. We translate technical signals into business impact, name who’s most exposed, and point to practical controls you can apply today. Leaders, analysts, and builders will all leave with clear priorities and signals to watch. The narrated daily feed is available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 9th, 2025. A new cloud-focused extortion crew targets AWS, a three-way ransomware alliance promises faster, louder campaigns, and Qilin pressures Asahi with leaked data. We cover a coordinated push against Salesforce tenants by a “Scattered Lapsus$ Hunters” collective and a Microsoft 365 outage that rippled through Teams and Exchange. Rounding out the brief: urgent fixes for a Redis Lua flaw, an MCP plugin risk in Figma workflows, mass exploitation of a WordPress theme, cache-smuggling “FileFix” lures, and Chinese operators using Nezha to drop Gh0st RAT—plus Mustang Panda tradecraft, malware-less database raids, Salesforce’s refusal to pay, UK arrests in a childcare dox case, a DraftKings ATO wave, and a new Android RAT on GitHub.</p><p> </p><p>Listeners will hear what happened, what it means, and one crisp recommendation per story—built for executives who need decisions and defenders who need next steps. We translate technical signals into business impact, name who’s most exposed, and point to practical controls you can apply today. Leaders, analysts, and builders will all leave with clear priorities and signals to watch. The narrated daily feed is available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 09 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/140ff45b/69d0d750.mp3" length="61912946" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1547</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 9th, 2025. A new cloud-focused extortion crew targets AWS, a three-way ransomware alliance promises faster, louder campaigns, and Qilin pressures Asahi with leaked data. We cover a coordinated push against Salesforce tenants by a “Scattered Lapsus$ Hunters” collective and a Microsoft 365 outage that rippled through Teams and Exchange. Rounding out the brief: urgent fixes for a Redis Lua flaw, an MCP plugin risk in Figma workflows, mass exploitation of a WordPress theme, cache-smuggling “FileFix” lures, and Chinese operators using Nezha to drop Gh0st RAT—plus Mustang Panda tradecraft, malware-less database raids, Salesforce’s refusal to pay, UK arrests in a childcare dox case, a DraftKings ATO wave, and a new Android RAT on GitHub.</p><p> </p><p>Listeners will hear what happened, what it means, and one crisp recommendation per story—built for executives who need decisions and defenders who need next steps. We translate technical signals into business impact, name who’s most exposed, and point to practical controls you can apply today. Leaders, analysts, and builders will all leave with clear priorities and signals to watch. The narrated daily feed is available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/140ff45b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 8th, 2025</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Daily Cyber News – October 8th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b8357bd-764a-4414-87b8-afbe755bf29a</guid>
      <link>https://share.transistor.fm/s/cca653ac</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 8th, 2025. A Fortune-scale standoff leads the brief as Salesforce refuses to pay after a mass data-theft extortion attempt. We also cover ShinyHunters’ new leak portal, active exploitation against Oracle E-Business Suite, Medusa’s push through GoAnywhere MFT, and a critical Redis flaw dubbed “RediShell.” Rounding out the lineup: CISA’s KEV addition for Zimbra, DraftKings credential-stuffing takeovers, Avnet’s supply-chain incident, a Cisco ASA/FTD zero-day chain with public PoC, and malware delivery through Microsoft Teams features.</p><p>Listeners will also hear about DPRK’s $2B crypto heists, how ransomware actors persist via legitimate remote-access tools, Google’s “won’t fix” stance on an ASCII-smuggling prompt attack in Gemini, the plugin-packed XWorm 6.0, and the “Mic-E-Mouse” side-channel. We close with Asahi’s ransomware disruption in Japan. Leaders get crisp decision cues; defenders get concrete control checks and signals to watch. It’s your concise, actionable rundown—also available at DailyCyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 8th, 2025. A Fortune-scale standoff leads the brief as Salesforce refuses to pay after a mass data-theft extortion attempt. We also cover ShinyHunters’ new leak portal, active exploitation against Oracle E-Business Suite, Medusa’s push through GoAnywhere MFT, and a critical Redis flaw dubbed “RediShell.” Rounding out the lineup: CISA’s KEV addition for Zimbra, DraftKings credential-stuffing takeovers, Avnet’s supply-chain incident, a Cisco ASA/FTD zero-day chain with public PoC, and malware delivery through Microsoft Teams features.</p><p>Listeners will also hear about DPRK’s $2B crypto heists, how ransomware actors persist via legitimate remote-access tools, Google’s “won’t fix” stance on an ASCII-smuggling prompt attack in Gemini, the plugin-packed XWorm 6.0, and the “Mic-E-Mouse” side-channel. We close with Asahi’s ransomware disruption in Japan. Leaders get crisp decision cues; defenders get concrete control checks and signals to watch. It’s your concise, actionable rundown—also available at DailyCyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cca653ac/062384ac.mp3" length="32695346" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>817</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 8th, 2025. A Fortune-scale standoff leads the brief as Salesforce refuses to pay after a mass data-theft extortion attempt. We also cover ShinyHunters’ new leak portal, active exploitation against Oracle E-Business Suite, Medusa’s push through GoAnywhere MFT, and a critical Redis flaw dubbed “RediShell.” Rounding out the lineup: CISA’s KEV addition for Zimbra, DraftKings credential-stuffing takeovers, Avnet’s supply-chain incident, a Cisco ASA/FTD zero-day chain with public PoC, and malware delivery through Microsoft Teams features.</p><p>Listeners will also hear about DPRK’s $2B crypto heists, how ransomware actors persist via legitimate remote-access tools, Google’s “won’t fix” stance on an ASCII-smuggling prompt attack in Gemini, the plugin-packed XWorm 6.0, and the “Mic-E-Mouse” side-channel. We close with Asahi’s ransomware disruption in Japan. Leaders get crisp decision cues; defenders get concrete control checks and signals to watch. It’s your concise, actionable rundown—also available at DailyCyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cca653ac/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 7th, 2025</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Daily Cyber News – October 7th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea0ec66c-5a3a-4d3f-8f69-e3cf9395b931</guid>
      <link>https://share.transistor.fm/s/253bd291</link>
      <description>
        <![CDATA[<p> This is today’s cyber news for October 7th, 2025. We cover active exploitation and high-impact enterprise risks: an Oracle E-Business Suite zero-day, Red Hat’s data-theft/extortion saga, ransomware crews abusing a GoAnywhere MFT flaw, a critical Redis issue enabling code execution, and a Zimbra zero-day via booby-trapped calendar invites. We then shift to platform and infrastructure risks—from LinkedIn’s fight against large-scale scraping and a Unity engine vulnerability, to Dell UnityVSA RCE, a Zabbix Windows privilege escalation, and a Sudo LPE with public exploit code. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This is today’s cyber news for October 7th, 2025. We cover active exploitation and high-impact enterprise risks: an Oracle E-Business Suite zero-day, Red Hat’s data-theft/extortion saga, ransomware crews abusing a GoAnywhere MFT flaw, a critical Redis issue enabling code execution, and a Zimbra zero-day via booby-trapped calendar invites. We then shift to platform and infrastructure risks—from LinkedIn’s fight against large-scale scraping and a Unity engine vulnerability, to Dell UnityVSA RCE, a Zabbix Windows privilege escalation, and a Sudo LPE with public exploit code. </p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/253bd291/e019d5e2.mp3" length="30941426" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>773</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This is today’s cyber news for October 7th, 2025. We cover active exploitation and high-impact enterprise risks: an Oracle E-Business Suite zero-day, Red Hat’s data-theft/extortion saga, ransomware crews abusing a GoAnywhere MFT flaw, a critical Redis issue enabling code execution, and a Zimbra zero-day via booby-trapped calendar invites. We then shift to platform and infrastructure risks—from LinkedIn’s fight against large-scale scraping and a Unity engine vulnerability, to Dell UnityVSA RCE, a Zabbix Windows privilege escalation, and a Sudo LPE with public exploit code. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/253bd291/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 6th, 2025</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Daily Cyber News – October 6th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d476dd3-4f0f-4e12-bd59-417cd73fe787</guid>
      <link>https://share.transistor.fm/s/51ecba48</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 6th, 2025. We open with a Zimbra zero-day delivered through malicious calendar files and why auto-parsing turns invites into compromise. Then we look at researchers repurposing Amazon’s X-Ray tracing for command-and-control, a fivefold surge of scans on Palo Alto portals, and fresh additions to CISA’s Known Exploited Vulnerabilities list. Rounding out the top set, Discord disclosed a third-party support breach exposing personal data and IDs, raising the risk of targeted phishing against recent ticket holders.</p><p> </p><p>You’ll also hear about ParkMobile’s 2021 breach settlement, the “WireTap” side-channel against Intel SGX, a Unity ecosystem flaw with supply-chain implications, Outlook’s SVG block, and new Salesforce leak-site claims. We cover Oracle E-Business extortion emails, the DNS-abusing “Detour Dog” operation feeding Strela, Rhadamanthys stealer upgrades, and the troubling rise of exposed ICS/OT devices. Closing stories include Android spyware impersonating Signal and ToTok, the SORVEPOTEL WhatsApp worm, the Cavalry Werewolf espionage cluster, risks around Windows “Speak for Me,” a full-stack Chinese-language crime crew, and Signal’s post-quantum key upgrade—available at DailyCyber.News</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 6th, 2025. We open with a Zimbra zero-day delivered through malicious calendar files and why auto-parsing turns invites into compromise. Then we look at researchers repurposing Amazon’s X-Ray tracing for command-and-control, a fivefold surge of scans on Palo Alto portals, and fresh additions to CISA’s Known Exploited Vulnerabilities list. Rounding out the top set, Discord disclosed a third-party support breach exposing personal data and IDs, raising the risk of targeted phishing against recent ticket holders.</p><p> </p><p>You’ll also hear about ParkMobile’s 2021 breach settlement, the “WireTap” side-channel against Intel SGX, a Unity ecosystem flaw with supply-chain implications, Outlook’s SVG block, and new Salesforce leak-site claims. We cover Oracle E-Business extortion emails, the DNS-abusing “Detour Dog” operation feeding Strela, Rhadamanthys stealer upgrades, and the troubling rise of exposed ICS/OT devices. Closing stories include Android spyware impersonating Signal and ToTok, the SORVEPOTEL WhatsApp worm, the Cavalry Werewolf espionage cluster, risks around Windows “Speak for Me,” a full-stack Chinese-language crime crew, and Signal’s post-quantum key upgrade—available at DailyCyber.News</p>]]>
      </content:encoded>
      <pubDate>Mon, 06 Oct 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/51ecba48/2e00421c.mp3" length="55529906" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1387</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 6th, 2025. We open with a Zimbra zero-day delivered through malicious calendar files and why auto-parsing turns invites into compromise. Then we look at researchers repurposing Amazon’s X-Ray tracing for command-and-control, a fivefold surge of scans on Palo Alto portals, and fresh additions to CISA’s Known Exploited Vulnerabilities list. Rounding out the top set, Discord disclosed a third-party support breach exposing personal data and IDs, raising the risk of targeted phishing against recent ticket holders.</p><p> </p><p>You’ll also hear about ParkMobile’s 2021 breach settlement, the “WireTap” side-channel against Intel SGX, a Unity ecosystem flaw with supply-chain implications, Outlook’s SVG block, and new Salesforce leak-site claims. We cover Oracle E-Business extortion emails, the DNS-abusing “Detour Dog” operation feeding Strela, Rhadamanthys stealer upgrades, and the troubling rise of exposed ICS/OT devices. Closing stories include Android spyware impersonating Signal and ToTok, the SORVEPOTEL WhatsApp worm, the Cavalry Werewolf espionage cluster, risks around Windows “Speak for Me,” a full-stack Chinese-language crime crew, and Signal’s post-quantum key upgrade—available at DailyCyber.News</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/51ecba48/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 3rd, 2025</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Daily Cyber News – October 3rd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4519bd22-4f06-40a6-a6ad-df87413e1d36</guid>
      <link>https://share.transistor.fm/s/b4da659a</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 3rd, 2025. We cover Red Hat’s internal GitLab breach and what “customer engagement records” could expose, Microsoft’s move to block inline SVG in Outlook, and a critical remote-code-execution flaw in DrayTek Vigor routers. We also break down Android spyware impersonating Signal and ToTok, and the “Gemini Trifecta” weaknesses that show how AI assistants can inherit risky permissions from connected apps.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 3rd, 2025. We cover Red Hat’s internal GitLab breach and what “customer engagement records” could expose, Microsoft’s move to block inline SVG in Outlook, and a critical remote-code-execution flaw in DrayTek Vigor routers. We also break down Android spyware impersonating Signal and ToTok, and the “Gemini Trifecta” weaknesses that show how AI assistants can inherit risky permissions from connected apps.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b4da659a/1030e82f.mp3" length="38416945" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>960</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 3rd, 2025. We cover Red Hat’s internal GitLab breach and what “customer engagement records” could expose, Microsoft’s move to block inline SVG in Outlook, and a critical remote-code-execution flaw in DrayTek Vigor routers. We also break down Android spyware impersonating Signal and ToTok, and the “Gemini Trifecta” weaknesses that show how AI assistants can inherit risky permissions from connected apps.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b4da659a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 2nd, 2025</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Daily Cyber News – October 2nd, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb7c2058-844e-4855-8f7d-8ef1fbf7b4af</guid>
      <link>https://share.transistor.fm/s/112c201f</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 2nd, 2025. Federal shutdowns are disrupting cyber intelligence sharing at CISA, a critical flaw in Red Hat’s OpenShift AI platform threatens hybrid environments, and OpenSSL has released urgent patches. We also cover identity issues at OneLogin, a widening WestJet breach that exposed passports and IDs, and a major Allianz Life data breach with Social Security numbers at risk. From Google Drive’s new ransomware defenses to fresh Android banking malware, DNS hijacking campaigns, and router abuse for smishing, defenders are facing a crowded threat landscape today.</p><p>Listeners will hear about hardware side-channel research against Intel SGX, new encryption debates in the UK and EU, and Signal’s pushback on proposed scanning mandates. Other highlights include CABINETRAT malware spreading through Excel add-ins, Mandiant’s counter to Salesforce-targeted social engineering, Apple’s FontParser patch, and Bitdefender’s report on hidden breaches. Whether you’re a leader, defender, or builder, these insights will keep you prepared. The BareMetalCyber Daily Brief is available each day at daily cyber news dot com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 2nd, 2025. Federal shutdowns are disrupting cyber intelligence sharing at CISA, a critical flaw in Red Hat’s OpenShift AI platform threatens hybrid environments, and OpenSSL has released urgent patches. We also cover identity issues at OneLogin, a widening WestJet breach that exposed passports and IDs, and a major Allianz Life data breach with Social Security numbers at risk. From Google Drive’s new ransomware defenses to fresh Android banking malware, DNS hijacking campaigns, and router abuse for smishing, defenders are facing a crowded threat landscape today.</p><p>Listeners will hear about hardware side-channel research against Intel SGX, new encryption debates in the UK and EU, and Signal’s pushback on proposed scanning mandates. Other highlights include CABINETRAT malware spreading through Excel add-ins, Mandiant’s counter to Salesforce-targeted social engineering, Apple’s FontParser patch, and Bitdefender’s report on hidden breaches. Whether you’re a leader, defender, or builder, these insights will keep you prepared. The BareMetalCyber Daily Brief is available each day at daily cyber news dot com.</p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/112c201f/0a5a5ae7.mp3" length="39684145" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 2nd, 2025. Federal shutdowns are disrupting cyber intelligence sharing at CISA, a critical flaw in Red Hat’s OpenShift AI platform threatens hybrid environments, and OpenSSL has released urgent patches. We also cover identity issues at OneLogin, a widening WestJet breach that exposed passports and IDs, and a major Allianz Life data breach with Social Security numbers at risk. From Google Drive’s new ransomware defenses to fresh Android banking malware, DNS hijacking campaigns, and router abuse for smishing, defenders are facing a crowded threat landscape today.</p><p>Listeners will hear about hardware side-channel research against Intel SGX, new encryption debates in the UK and EU, and Signal’s pushback on proposed scanning mandates. Other highlights include CABINETRAT malware spreading through Excel add-ins, Mandiant’s counter to Salesforce-targeted social engineering, Apple’s FontParser patch, and Bitdefender’s report on hidden breaches. Whether you’re a leader, defender, or builder, these insights will keep you prepared. The BareMetalCyber Daily Brief is available each day at daily cyber news dot com.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/112c201f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – October 1st, 2025</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Daily Cyber News – October 1st, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f56aec53-89b2-4712-ab47-4d34ac219fd0</guid>
      <link>https://share.transistor.fm/s/7c88273a</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for October 1st, 2025. Imgur’s sudden U.K. shutdown after a looming privacy fine leads the brief with a real-world reminder that regulatory pressure can break your workflows overnight. We cover Unit 42’s “Phantom Taurus” living filelessly inside Microsoft Exchange, fresh Android banking campaigns draining accounts in Italy and Spain, the FTC’s suit against the youth app Sendit, and PDF-based phishing kits that slip past filters. From there, we dig into low-cost side channels that challenge cloud isolation, WestJet’s passport data exposure, mass-vulnerable Cisco edge gear, a surveillance-tech vendor breach, and a ten-terabyte insurer leak.</p><p>You’ll also hear about a Western Digital My Cloud command-injection flaw, long-running VMware zero-day exploitation by a China-nexus actor, the limits of AI-based ransomware detection, an actively exploited Linux privilege escalation, and a record U.K. crypto-laundering conviction. We close with enterprise AI prompt-injection risks in Gemini, Microsoft’s “agentic” Sentinel shift, U.K. lawmakers pressing TCS over Jaguar Land Rover, Apple’s iOS 26 security fix, and new CISA KEV additions. Leaders, defenders, and builders get clear impact and immediate takeaways—available at dailycyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for October 1st, 2025. Imgur’s sudden U.K. shutdown after a looming privacy fine leads the brief with a real-world reminder that regulatory pressure can break your workflows overnight. We cover Unit 42’s “Phantom Taurus” living filelessly inside Microsoft Exchange, fresh Android banking campaigns draining accounts in Italy and Spain, the FTC’s suit against the youth app Sendit, and PDF-based phishing kits that slip past filters. From there, we dig into low-cost side channels that challenge cloud isolation, WestJet’s passport data exposure, mass-vulnerable Cisco edge gear, a surveillance-tech vendor breach, and a ten-terabyte insurer leak.</p><p>You’ll also hear about a Western Digital My Cloud command-injection flaw, long-running VMware zero-day exploitation by a China-nexus actor, the limits of AI-based ransomware detection, an actively exploited Linux privilege escalation, and a record U.K. crypto-laundering conviction. We close with enterprise AI prompt-injection risks in Gemini, Microsoft’s “agentic” Sentinel shift, U.K. lawmakers pressing TCS over Jaguar Land Rover, Apple’s iOS 26 security fix, and new CISA KEV additions. Leaders, defenders, and builders get clear impact and immediate takeaways—available at dailycyber.news.</p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Oct 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7c88273a/c177a881.mp3" length="43525105" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1087</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for October 1st, 2025. Imgur’s sudden U.K. shutdown after a looming privacy fine leads the brief with a real-world reminder that regulatory pressure can break your workflows overnight. We cover Unit 42’s “Phantom Taurus” living filelessly inside Microsoft Exchange, fresh Android banking campaigns draining accounts in Italy and Spain, the FTC’s suit against the youth app Sendit, and PDF-based phishing kits that slip past filters. From there, we dig into low-cost side channels that challenge cloud isolation, WestJet’s passport data exposure, mass-vulnerable Cisco edge gear, a surveillance-tech vendor breach, and a ten-terabyte insurer leak.</p><p>You’ll also hear about a Western Digital My Cloud command-injection flaw, long-running VMware zero-day exploitation by a China-nexus actor, the limits of AI-based ransomware detection, an actively exploited Linux privilege escalation, and a record U.K. crypto-laundering conviction. We close with enterprise AI prompt-injection risks in Gemini, Microsoft’s “agentic” Sentinel shift, U.K. lawmakers pressing TCS over Jaguar Land Rover, Apple’s iOS 26 security fix, and new CISA KEV additions. Leaders, defenders, and builders get clear impact and immediate takeaways—available at dailycyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7c88273a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 30th, 2025</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Daily Cyber News – September 30th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7589e9f7-fe77-431b-8b08-702f3c43c54d</guid>
      <link>https://share.transistor.fm/s/72d1e008</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. A busy slate led by Asahi’s nationwide logistics pause after a cyberattack, a Harrods third-party breach affecting hundreds of thousands of shoppers, and the UK’s rare £1.5B loan guarantee to steady Jaguar Land Rover after a crippling incident. We cover edge-device pressure with Akira ransomware exploiting a SonicWall flaw, plus a rogue npm package (“postmark-mcp”) that abused Model Context Protocol plumbing to quietly copy emails. Mid-brief, we track LLM-crafted SVG phishing, Ukraine police impersonation lures, insider recruitment by a ransomware crew, teen espionage arrests in the Netherlands, and the DarkCloud infostealer’s comeback.</p><p>You’ll also hear government warnings to retire end-of-life Cisco ASA gear, the record “Bitcoin Queen” conviction, WestJet’s breach notifications to U.S. residents, the slow march of U.S. IoT labeling amid rising attacks, and an “EvilAI” malware theme hiding behind fake productivity tools. We close with election-period targeting in Moldova, real-world AI adoption inside SOCs, mixed results on AI-written vulnerability checks, privacy concerns with Tile trackers, and OpenAI’s safety-model routing. Designed for leaders, defenders, and builders—available at DailyCyber.News</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. A busy slate led by Asahi’s nationwide logistics pause after a cyberattack, a Harrods third-party breach affecting hundreds of thousands of shoppers, and the UK’s rare £1.5B loan guarantee to steady Jaguar Land Rover after a crippling incident. We cover edge-device pressure with Akira ransomware exploiting a SonicWall flaw, plus a rogue npm package (“postmark-mcp”) that abused Model Context Protocol plumbing to quietly copy emails. Mid-brief, we track LLM-crafted SVG phishing, Ukraine police impersonation lures, insider recruitment by a ransomware crew, teen espionage arrests in the Netherlands, and the DarkCloud infostealer’s comeback.</p><p>You’ll also hear government warnings to retire end-of-life Cisco ASA gear, the record “Bitcoin Queen” conviction, WestJet’s breach notifications to U.S. residents, the slow march of U.S. IoT labeling amid rising attacks, and an “EvilAI” malware theme hiding behind fake productivity tools. We close with election-period targeting in Moldova, real-world AI adoption inside SOCs, mixed results on AI-written vulnerability checks, privacy concerns with Tile trackers, and OpenAI’s safety-model routing. Designed for leaders, defenders, and builders—available at DailyCyber.News</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Sep 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/72d1e008/f81ac72b.mp3" length="43503031" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1087</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. A busy slate led by Asahi’s nationwide logistics pause after a cyberattack, a Harrods third-party breach affecting hundreds of thousands of shoppers, and the UK’s rare £1.5B loan guarantee to steady Jaguar Land Rover after a crippling incident. We cover edge-device pressure with Akira ransomware exploiting a SonicWall flaw, plus a rogue npm package (“postmark-mcp”) that abused Model Context Protocol plumbing to quietly copy emails. Mid-brief, we track LLM-crafted SVG phishing, Ukraine police impersonation lures, insider recruitment by a ransomware crew, teen espionage arrests in the Netherlands, and the DarkCloud infostealer’s comeback.</p><p>You’ll also hear government warnings to retire end-of-life Cisco ASA gear, the record “Bitcoin Queen” conviction, WestJet’s breach notifications to U.S. residents, the slow march of U.S. IoT labeling amid rising attacks, and an “EvilAI” malware theme hiding behind fake productivity tools. We close with election-period targeting in Moldova, real-world AI adoption inside SOCs, mixed results on AI-written vulnerability checks, privacy concerns with Tile trackers, and OpenAI’s safety-model routing. Designed for leaders, defenders, and builders—available at DailyCyber.News</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/72d1e008/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 29th, 2025</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Daily Cyber News – September 29th, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f570d08d-930f-4881-a752-7f3085cbd7a1</guid>
      <link>https://share.transistor.fm/s/ed4c5998</link>
      <description>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. Ransomware, zero-days, and persistent backdoors dominated the headlines, showing just how wide the attack surface has become. Medusa claims to have stolen more than 800 gigabytes of Comcast data and is demanding $1.2 million in extortion. Akira continues to find ways around SonicWall VPN multi-factor authentication, raising fresh concerns about identity controls. The UK’s Co-op has revealed that its April attack cost the retailer hundreds of millions in lost revenue, while Ohio’s Union County confirmed nearly 45,000 residents had Social Security and financial data exposed. Attackers also seeded malicious ads for fake Teams installers that drop the Oyster backdoor.</p><p>Other stories cover Salesforce’s “ForcedLeak” flaw, the GoAnywhere zero-day exploited before disclosure, Cisco firewall attacks that dropped entirely new malware families, and Google’s warning of the stealthy “Brickstorm” backdoor aimed at U.S. legal and tech firms. The lineup continues with phishing campaigns delivering PureRAT, AT&amp;T’s $177 million settlement over breaches, and auto supply chain disruptions from cyber incidents. We close with macOS malware, fake TradingView ads, and Microsoft acknowledging Outlook and Edge security issues.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. Ransomware, zero-days, and persistent backdoors dominated the headlines, showing just how wide the attack surface has become. Medusa claims to have stolen more than 800 gigabytes of Comcast data and is demanding $1.2 million in extortion. Akira continues to find ways around SonicWall VPN multi-factor authentication, raising fresh concerns about identity controls. The UK’s Co-op has revealed that its April attack cost the retailer hundreds of millions in lost revenue, while Ohio’s Union County confirmed nearly 45,000 residents had Social Security and financial data exposed. Attackers also seeded malicious ads for fake Teams installers that drop the Oyster backdoor.</p><p>Other stories cover Salesforce’s “ForcedLeak” flaw, the GoAnywhere zero-day exploited before disclosure, Cisco firewall attacks that dropped entirely new malware families, and Google’s warning of the stealthy “Brickstorm” backdoor aimed at U.S. legal and tech firms. The lineup continues with phishing campaigns delivering PureRAT, AT&amp;T’s $177 million settlement over breaches, and auto supply chain disruptions from cyber incidents. We close with macOS malware, fake TradingView ads, and Microsoft acknowledging Outlook and Edge security issues.</p>]]>
      </content:encoded>
      <pubDate>Mon, 29 Sep 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ed4c5998/409f8258.mp3" length="50606071" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1264</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is today’s cyber news for 2025-09-29. Ransomware, zero-days, and persistent backdoors dominated the headlines, showing just how wide the attack surface has become. Medusa claims to have stolen more than 800 gigabytes of Comcast data and is demanding $1.2 million in extortion. Akira continues to find ways around SonicWall VPN multi-factor authentication, raising fresh concerns about identity controls. The UK’s Co-op has revealed that its April attack cost the retailer hundreds of millions in lost revenue, while Ohio’s Union County confirmed nearly 45,000 residents had Social Security and financial data exposed. Attackers also seeded malicious ads for fake Teams installers that drop the Oyster backdoor.</p><p>Other stories cover Salesforce’s “ForcedLeak” flaw, the GoAnywhere zero-day exploited before disclosure, Cisco firewall attacks that dropped entirely new malware families, and Google’s warning of the stealthy “Brickstorm” backdoor aimed at U.S. legal and tech firms. The lineup continues with phishing campaigns delivering PureRAT, AT&amp;T’s $177 million settlement over breaches, and auto supply chain disruptions from cyber incidents. We close with macOS malware, fake TradingView ads, and Microsoft acknowledging Outlook and Edge security issues.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ed4c5998/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 26, 2025</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Daily Cyber News – September 26, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91d491aa-81cf-4f18-b6a5-12ed96ccf2e8</guid>
      <link>https://share.transistor.fm/s/835464f8</link>
      <description>
        <![CDATA[<p><strong>This is today’s cyber news for September 25, 2025.</strong> In this edition we cover major developments that matter to defenders, leaders, and builders. From new malware variants slipping into developer tools, to phishing training that fails in practice, to dangerous flaws in Cisco firewalls already under attack—today’s feed is packed with lessons that directly affect how organizations secure their people and systems. We also examine supply-chain compromises in popular software packages and the fallout from data breaches hitting telecoms and retailers. Each story highlights where attackers are gaining ground and where defenders need to respond quickly.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This is today’s cyber news for September 25, 2025.</strong> In this edition we cover major developments that matter to defenders, leaders, and builders. From new malware variants slipping into developer tools, to phishing training that fails in practice, to dangerous flaws in Cisco firewalls already under attack—today’s feed is packed with lessons that directly affect how organizations secure their people and systems. We also examine supply-chain compromises in popular software packages and the fallout from data breaches hitting telecoms and retailers. Each story highlights where attackers are gaining ground and where defenders need to respond quickly.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Sep 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/835464f8/2e4c105d.mp3" length="46457907" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1161</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This is today’s cyber news for September 25, 2025.</strong> In this edition we cover major developments that matter to defenders, leaders, and builders. From new malware variants slipping into developer tools, to phishing training that fails in practice, to dangerous flaws in Cisco firewalls already under attack—today’s feed is packed with lessons that directly affect how organizations secure their people and systems. We also examine supply-chain compromises in popular software packages and the fallout from data breaches hitting telecoms and retailers. Each story highlights where attackers are gaining ground and where defenders need to respond quickly.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/835464f8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 25, 2025</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Daily Cyber News – September 25, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9e897a6-ca01-4bfa-8609-2abb8679424c</guid>
      <link>https://share.transistor.fm/s/6c6eb444</link>
      <description>
        <![CDATA[<p>Daily Cyber News for September 25th, 2025. Today’s episode tracks a rapid-fire landscape where exploits move at disclosure speed and persistence hides below the operating system. We open with a GeoServer flaw weaponized within days against a U.S. federal agency, then shift to new Supermicro BMC issues that enable backdoors that survive wipe-and-rebuild. We cover election-season influence ops aimed at Moldova, a convincing PyPI phishing wave that targets software maintainers, and Cisco’s actively exploited SNMP bug on core network gear. Mid-brief, we examine Okta’s push to govern non-human identities, China-nexus campaigns like RedNovember and BRICKSTORM, and mobile security risk from a OnePlus SMS permissions bypass.</p><p>You’ll also hear practical takeaways on secure email gateways after a Libraesva flaw, a new “Obscura” ransomware strain, and a ShadowV2 botnet built from misconfigured Docker on AWS. We unpack airport disruptions linked to ransomware, critical fixes for SolarWinds Web Help Desk and Wondershare RepairIt, GitHub notification abuse for crypto theft, record-scale DDoS at 22.2 Tbps, and a Pandoc SSRF used to grab AWS metadata. Leaders, defenders, and builders get concrete steps throughout. The daily audio feed is available at dailycyber.news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Daily Cyber News for September 25th, 2025. Today’s episode tracks a rapid-fire landscape where exploits move at disclosure speed and persistence hides below the operating system. We open with a GeoServer flaw weaponized within days against a U.S. federal agency, then shift to new Supermicro BMC issues that enable backdoors that survive wipe-and-rebuild. We cover election-season influence ops aimed at Moldova, a convincing PyPI phishing wave that targets software maintainers, and Cisco’s actively exploited SNMP bug on core network gear. Mid-brief, we examine Okta’s push to govern non-human identities, China-nexus campaigns like RedNovember and BRICKSTORM, and mobile security risk from a OnePlus SMS permissions bypass.</p><p>You’ll also hear practical takeaways on secure email gateways after a Libraesva flaw, a new “Obscura” ransomware strain, and a ShadowV2 botnet built from misconfigured Docker on AWS. We unpack airport disruptions linked to ransomware, critical fixes for SolarWinds Web Help Desk and Wondershare RepairIt, GitHub notification abuse for crypto theft, record-scale DDoS at 22.2 Tbps, and a Pandoc SSRF used to grab AWS metadata. Leaders, defenders, and builders get concrete steps throughout. The daily audio feed is available at dailycyber.news.</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Sep 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6c6eb444/068c28a8.mp3" length="37568307" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>938</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Daily Cyber News for September 25th, 2025. Today’s episode tracks a rapid-fire landscape where exploits move at disclosure speed and persistence hides below the operating system. We open with a GeoServer flaw weaponized within days against a U.S. federal agency, then shift to new Supermicro BMC issues that enable backdoors that survive wipe-and-rebuild. We cover election-season influence ops aimed at Moldova, a convincing PyPI phishing wave that targets software maintainers, and Cisco’s actively exploited SNMP bug on core network gear. Mid-brief, we examine Okta’s push to govern non-human identities, China-nexus campaigns like RedNovember and BRICKSTORM, and mobile security risk from a OnePlus SMS permissions bypass.</p><p>You’ll also hear practical takeaways on secure email gateways after a Libraesva flaw, a new “Obscura” ransomware strain, and a ShadowV2 botnet built from misconfigured Docker on AWS. We unpack airport disruptions linked to ransomware, critical fixes for SolarWinds Web Help Desk and Wondershare RepairIt, GitHub notification abuse for crypto theft, record-scale DDoS at 22.2 Tbps, and a Pandoc SSRF used to grab AWS metadata. Leaders, defenders, and builders get concrete steps throughout. The daily audio feed is available at dailycyber.news.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6c6eb444/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 24, 2025</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Daily Cyber News – September 24, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">448a2819-2ac0-499b-bce0-9a517431dff7</guid>
      <link>https://share.transistor.fm/s/274d8939</link>
      <description>
        <![CDATA[<p>Today’s briefing brings together the most urgent developments across the cyber landscape. We begin with Boyd Gaming confirming a data breach affecting employees, then turn to Microsoft’s patch of a dangerous Entra ID flaw that could allow Global Admin impersonation. GitHub’s changes to npm authentication highlight how supply-chain security is shifting, while Cloudflare reports blocking the largest denial-of-service attack ever measured. We also cover a U.S. federal breach through an unpatched GeoServer, the takedown of massive SIM farms near the United Nations, and emergency patches from Libraesva, SolarWinds, and SonicWall. Alongside state-linked espionage, ransomware claims, and airport disruptions, the episode paints a wide picture of how cyber risk cuts across sectors.</p><p>Listeners will gain a sharper sense of what matters now—why seemingly “low-impact” bugs hide major risks, how cloud misconfigurations feed rentable botnets, and why operational downtime in manufacturing and aviation reminds us that digital incidents hit the physical world fast. Each story is delivered in clear, practical language designed to help you brief leadership, recalibrate defenses, and stay one step ahead. Hear it all, daily, at d c n dot baremetalcyber dot com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today’s briefing brings together the most urgent developments across the cyber landscape. We begin with Boyd Gaming confirming a data breach affecting employees, then turn to Microsoft’s patch of a dangerous Entra ID flaw that could allow Global Admin impersonation. GitHub’s changes to npm authentication highlight how supply-chain security is shifting, while Cloudflare reports blocking the largest denial-of-service attack ever measured. We also cover a U.S. federal breach through an unpatched GeoServer, the takedown of massive SIM farms near the United Nations, and emergency patches from Libraesva, SolarWinds, and SonicWall. Alongside state-linked espionage, ransomware claims, and airport disruptions, the episode paints a wide picture of how cyber risk cuts across sectors.</p><p>Listeners will gain a sharper sense of what matters now—why seemingly “low-impact” bugs hide major risks, how cloud misconfigurations feed rentable botnets, and why operational downtime in manufacturing and aviation reminds us that digital incidents hit the physical world fast. Each story is delivered in clear, practical language designed to help you brief leadership, recalibrate defenses, and stay one step ahead. Hear it all, daily, at d c n dot baremetalcyber dot com.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Sep 2025 05:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/274d8939/6ab775a4.mp3" length="61708467" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1542</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today’s briefing brings together the most urgent developments across the cyber landscape. We begin with Boyd Gaming confirming a data breach affecting employees, then turn to Microsoft’s patch of a dangerous Entra ID flaw that could allow Global Admin impersonation. GitHub’s changes to npm authentication highlight how supply-chain security is shifting, while Cloudflare reports blocking the largest denial-of-service attack ever measured. We also cover a U.S. federal breach through an unpatched GeoServer, the takedown of massive SIM farms near the United Nations, and emergency patches from Libraesva, SolarWinds, and SonicWall. Alongside state-linked espionage, ransomware claims, and airport disruptions, the episode paints a wide picture of how cyber risk cuts across sectors.</p><p>Listeners will gain a sharper sense of what matters now—why seemingly “low-impact” bugs hide major risks, how cloud misconfigurations feed rentable botnets, and why operational downtime in manufacturing and aviation reminds us that digital incidents hit the physical world fast. Each story is delivered in clear, practical language designed to help you brief leadership, recalibrate defenses, and stay one step ahead. Hear it all, daily, at d c n dot baremetalcyber dot com.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/274d8939/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Daily Cyber News – September 23, 2025</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Daily Cyber News – September 23, 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d560450-9801-44bd-a93c-dbcf8197b0dc</guid>
      <link>https://share.transistor.fm/s/8645f6fe</link>
      <description>
        <![CDATA[<p>Europe’s aviation sector reeled this weekend as a ransomware attack on Collins Aerospace disrupted check-in systems at major airports, from Heathrow to Brussels to Berlin. At the same time, automaker Stellantis confirmed a customer data breach tied to a third-party platform, raising alarms across the supply chain. Microsoft also disclosed a critical flaw in Entra ID that could have let attackers impersonate Global Administrators across tenants — a stark reminder of how fragile identity systems can be. Add in fake GitHub apps pushing the Atomic infostealer to Mac users and a new Windows “EDR-Freeze” technique suspending endpoint defenses, and it’s clear today’s headlines carried weight for both enterprises and individuals.</p><p>In this first edition of the BMC Daily Cyber Brief, we unpack these developments in plain English — what happened, why it matters, and what defenders should do next. You’ll also hear about DHS’s misconfigured data hub, the ShadowLeak exploit against AI agents, and the cyberattack that froze Jaguar Land Rover’s production lines. It’s the signal you need in under 16 minutes, with context you can act on today. Produced by BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Europe’s aviation sector reeled this weekend as a ransomware attack on Collins Aerospace disrupted check-in systems at major airports, from Heathrow to Brussels to Berlin. At the same time, automaker Stellantis confirmed a customer data breach tied to a third-party platform, raising alarms across the supply chain. Microsoft also disclosed a critical flaw in Entra ID that could have let attackers impersonate Global Administrators across tenants — a stark reminder of how fragile identity systems can be. Add in fake GitHub apps pushing the Atomic infostealer to Mac users and a new Windows “EDR-Freeze” technique suspending endpoint defenses, and it’s clear today’s headlines carried weight for both enterprises and individuals.</p><p>In this first edition of the BMC Daily Cyber Brief, we unpack these developments in plain English — what happened, why it matters, and what defenders should do next. You’ll also hear about DHS’s misconfigured data hub, the ShadowLeak exploit against AI agents, and the cyberattack that froze Jaguar Land Rover’s production lines. It’s the signal you need in under 16 minutes, with context you can act on today. Produced by BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Sep 2025 04:00:00 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8645f6fe/967686e2.mp3" length="47962981" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1198</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Europe’s aviation sector reeled this weekend as a ransomware attack on Collins Aerospace disrupted check-in systems at major airports, from Heathrow to Brussels to Berlin. At the same time, automaker Stellantis confirmed a customer data breach tied to a third-party platform, raising alarms across the supply chain. Microsoft also disclosed a critical flaw in Entra ID that could have let attackers impersonate Global Administrators across tenants — a stark reminder of how fragile identity systems can be. Add in fake GitHub apps pushing the Atomic infostealer to Mac users and a new Windows “EDR-Freeze” technique suspending endpoint defenses, and it’s clear today’s headlines carried weight for both enterprises and individuals.</p><p>In this first edition of the BMC Daily Cyber Brief, we unpack these developments in plain English — what happened, why it matters, and what defenders should do next. You’ll also hear about DHS’s misconfigured data hub, the ShadowLeak exploit against AI agents, and the cyberattack that froze Jaguar Land Rover’s production lines. It’s the signal you need in under 16 minutes, with context you can act on today. Produced by BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8645f6fe/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Welcome to the Daily Cyber News Podcast!</title>
      <itunes:title>Welcome to the Daily Cyber News Podcast!</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">25db71f3-19c1-42e7-92b0-cfff4aadd904</guid>
      <link>https://share.transistor.fm/s/ccb15072</link>
      <description>
        <![CDATA[<p>The <strong>BCM Daily Cyber News </strong>is a short daily podcast that keeps you current on the most important developments in cybersecurity. Every weekday, we bring you clear updates on threats, breaches, vulnerabilities, and cyber trends — all in under 15 minutes.</p><p><br>Whether you work in security, manage technology, study the field, or simply want to understand how cyber events affect your world, this briefing is designed for you. Subscribe today and make the BCM Daily Cyber News part of your morning. For more articles, courses, and resources, visit <strong>BareMetalCyber.com</strong>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The <strong>BCM Daily Cyber News </strong>is a short daily podcast that keeps you current on the most important developments in cybersecurity. Every weekday, we bring you clear updates on threats, breaches, vulnerabilities, and cyber trends — all in under 15 minutes.</p><p><br>Whether you work in security, manage technology, study the field, or simply want to understand how cyber events affect your world, this briefing is designed for you. Subscribe today and make the BCM Daily Cyber News part of your morning. For more articles, courses, and resources, visit <strong>BareMetalCyber.com</strong>.</p>]]>
      </content:encoded>
      <pubDate>Mon, 22 Sep 2025 13:28:27 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ccb15072/47bfbf79.mp3" length="988700" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>124</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The <strong>BCM Daily Cyber News </strong>is a short daily podcast that keeps you current on the most important developments in cybersecurity. Every weekday, we bring you clear updates on threats, breaches, vulnerabilities, and cyber trends — all in under 15 minutes.</p><p><br>Whether you work in security, manage technology, study the field, or simply want to understand how cyber events affect your world, this briefing is designed for you. Subscribe today and make the BCM Daily Cyber News part of your morning. For more articles, courses, and resources, visit <strong>BareMetalCyber.com</strong>.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, baremetalcyber, cyber podcast, cyber news, data breaches, ransomware, phishing, malware, threat intelligence, zero day, patches, vulnerabilities, exploits, cloud security, identity theft, incident response, cyber defense, network security, security trends, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ccb15072/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
