1. EachPod
EachPod
Daily Security Review - Podcast

Daily Security Review

Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities

Technology Tech News News
Update frequency
every day
Average duration
34 minutes
Episodes
332
Years Active
2025
Share to:
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages

Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages

Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed …

00:41:44  |   Fri 27 Jun 2025
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk

Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk

A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discov…

00:47:26  |   Fri 27 Jun 2025
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass

CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass

A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure f…

00:18:41  |   Fri 27 Jun 2025
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS

OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS

A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The…

01:18:25  |   Thu 26 Jun 2025
Central Kentucky Radiology’s 2024 Data Breach Affects 167,000

Central Kentucky Radiology’s 2024 Data Breach Affects 167,000

In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s sys…

00:51:40  |   Thu 26 Jun 2025
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data

Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data

In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed …

01:09:30  |   Thu 26 Jun 2025
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security

Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security

Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10…

00:54:30  |   Thu 26 Jun 2025
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App

U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App

The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted …

00:45:38  |   Wed 25 Jun 2025
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients

How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients

The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Hea…

00:45:10  |   Wed 25 Jun 2025
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security

The Siemens-Microsoft Antivirus Dilemma Threatening OT Security

This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a signif…

01:23:55  |   Wed 25 Jun 2025
Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike

Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike

Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly,…

00:41:20  |   Wed 25 Jun 2025
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach

Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach

In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted …

00:44:50  |   Tue 24 Jun 2025
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks

NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks

This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a cr…

00:56:30  |   Tue 24 Jun 2025
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos

AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos

In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, G…

00:44:06  |   Tue 24 Jun 2025
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search

Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search

In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard.

Scammers are now hijacking Google Ads and manip…

00:32:40  |   Tue 24 Jun 2025
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic

From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic

In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime lan…

00:43:58  |   Mon 23 Jun 2025
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge

Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge

In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security…

00:57:15  |   Mon 23 Jun 2025
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident

The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident

In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry.…

00:53:58  |   Mon 23 Jun 2025
The Nucor Cyberattack: How Ransomware Threatens American Steel

The Nucor Cyberattack: How Ransomware Threatens American Steel

In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical l…

00:58:40  |   Mon 23 Jun 2025
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders

Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders

A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the m…

01:01:32  |   Sun 22 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Daily Security Review. This content is not affiliated with or endorsed by eachpod.com.