1. EachPod
EachPod
Daily Security Review - Podcast

Daily Security Review

Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities

Tech News Technology News
Update frequency
every day
Average duration
34 minutes
Episodes
330
Years Active
2025
Share to:
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How

Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How

Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Goog…

00:13:51  |   Mon 02 Jun 2025
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool

Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool

In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Du…

00:17:34  |   Mon 02 Jun 2025
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect

ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect

ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nat…

00:15:06  |   Fri 30 May 2025
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers

Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers

In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web deta…

00:14:10  |   Fri 30 May 2025
Unbound Raises $4M to Secure Generative AI in the Enterprise

Unbound Raises $4M to Secure Generative AI in the Enterprise

In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensi…

00:20:08  |   Fri 30 May 2025
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push

Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push

Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-…

00:16:18  |   Thu 29 May 2025
Systemd as a Weapon: How PumaBot Exploits Linux Persistence

Systemd as a Weapon: How PumaBot Exploits Linux Persistence

Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into crypt…

00:18:38  |   Thu 29 May 2025
The LexisNexis Breach: 364,000 Records Exposed via GitHub

The LexisNexis Breach: 364,000 Records Exposed via GitHub

On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector w…

00:17:22  |   Thu 29 May 2025
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions

Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions

On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18…

00:12:30  |   Wed 28 May 2025
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations

Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations

The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transfor…

00:14:27  |   Wed 28 May 2025
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726

DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726

In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most no…

00:16:47  |   Wed 28 May 2025
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement

Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement

This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to th…

00:13:50  |   Tue 27 May 2025
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected

Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected

In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected una…

00:12:27  |   Tue 27 May 2025
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data

How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data

In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-servi…

00:22:54  |   Tue 27 May 2025
The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield

The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield

In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot ne…

00:28:34  |   Mon 26 May 2025
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting

Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting

In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate do…

00:28:48  |   Mon 26 May 2025
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks

FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks

In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive …

00:14:45  |   Mon 26 May 2025
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets

Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets

A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophistica…

00:25:57  |   Fri 23 May 2025
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown

$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown

In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–…

00:11:23  |   Fri 23 May 2025
From TikTok to Total Compromise: The Rise of Social Media Infostealers

From TikTok to Total Compromise: The Rise of Social Media Infostealers

In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting tr…

00:18:50  |   Fri 23 May 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Daily Security Review. This content is not affiliated with or endorsed by eachpod.com.