<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/cyberhub-podcast/" rel="self" type="application/rss+xml"/><title><![CDATA[CyberHub Podcast]]></title><podcast:guid>a670c6e6-a78d-58c3-b106-87555b5b3494</podcast:guid><lastBuildDate>Wed, 01 Apr 2026 13:00:09 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[All rights reserved.]]></copyright><managingEditor>James Azar</managingEditor><itunes:summary><![CDATA[The Hub of the Infosec Community. 
A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally.  
The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch.  

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.]]></itunes:summary><image><url>https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg</url><title>CyberHub Podcast</title><link><![CDATA[https://www.cyberhubpodcast.com]]></link></image><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><itunes:owner><itunes:name>James Azar</itunes:name></itunes:owner><itunes:author>James Azar</itunes:author><description>The Hub of the Infosec Community. 
A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally.  
The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch.  

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.</description><link>https://www.cyberhubpodcast.com</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Cybersecurity News for Practitioners by Practitioners Hosted by James Azar ]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"></itunes:category><itunes:category text="Business"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/cyberhub-podcast/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Cisco Source Code Stolen via Trivy Attack, Axios npm Compromised, Stryker Restores Manufacturing</title><itunes:title>Cisco Source Code Stolen via Trivy Attack, Axios npm Compromised, Stryker Restores Manufacturing</itunes:title><description><![CDATA[<p>🎙️ Cisco Source Code Stolen via Trivy Attack, Axios npm Compromised, Stryker Restores Manufacturing</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1087: Today's episode will discuss the latest news:</p><ul><li>Stolen Login Credentials Are Fueling Everything From Ransomware to Nation-State Cyberattacks as Initial Access Broker Economy Thrives </li><li>Anthropic's Claude Code Source Code Accidentally Leaked in npm Package Exposing Internal Architecture and Prompt System Details</li><li>TeamPCP Expands From Open Source Supply Chain Attacks to Targeting AWS Cloud Environments Using Stolen CI/CD Credentials</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/</a></p><p><a href="https://www.cybersecuritydive.com/news/stryker-restores-most-manufacturing-after-cyberattack/816024/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/stryker-restores-most-manufacturing-after-cyberattack/816024/</a></p><p><a href="https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/</a></p><p><a href="https://www.securityweek.com/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encryption/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encryption/</a></p><p><a href="https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cisco Source Code Stolen via Trivy Attack, Axios npm Compromised, Stryker Restores Manufacturing</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1087: Today's episode will discuss the latest news:</p><ul><li>Stolen Login Credentials Are Fueling Everything From Ransomware to Nation-State Cyberattacks as Initial Access Broker Economy Thrives </li><li>Anthropic's Claude Code Source Code Accidentally Leaked in npm Package Exposing Internal Architecture and Prompt System Details</li><li>TeamPCP Expands From Open Source Supply Chain Attacks to Targeting AWS Cloud Environments Using Stolen CI/CD Credentials</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/</a></p><p><a href="https://www.cybersecuritydive.com/news/stryker-restores-most-manufacturing-after-cyberattack/816024/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/stryker-restores-most-manufacturing-after-cyberattack/816024/</a></p><p><a href="https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/teampcp-moves-from-oss-to-aws-environments/</a></p><p><a href="https://www.securityweek.com/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encryption/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encryption/</a></p><p><a href="https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1ca7403e-1eab-4e05-ac65-dd2ef240260a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 01 Apr 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1ca7403e-1eab-4e05-ac65-dd2ef240260a.mp3" length="18188396" type="audio/mpeg"/><itunes:duration>18:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1087</itunes:episode><podcast:episode>1087</podcast:episode></item><item><title>F5 BIG-IP RCE Exploited in Wild, Fortinet EMS Flaw Attacked, Apple Blocks ClickFix on macOS</title><itunes:title>F5 BIG-IP RCE Exploited in Wild, Fortinet EMS Flaw Attacked, Apple Blocks ClickFix on macOS</itunes:title><description><![CDATA[<p>🎙️ F5 BIG-IP RCE Exploited in Wild, Fortinet EMS Flaw Attacked, Apple Blocks ClickFix on macOS</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1086: Today's episode will discuss the latest news:</p><ul><li>Hackers Backdoor Telnyx Python SDK in Supply Chain Attack Injecting Malicious Code Into Legitimate Telecom Developer Package </li><li>DeepLoad Malware Uses ClickFix Social Engineering and WMI Persistence for Stealthy Multi-Stage Infection Chains </li><li>Exposed Server Reveals TheGentlemen Ransomware Complete Toolkit Including Builders Playbooks and Attack Infrastructure</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html</a></p><p><a href="https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/</a></p><p><a href="https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html</a></p><p><a href="https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/</a></p><p><a href="https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/</a></p><p><a href="https://thecyberexpress.com/uae-cyberattacks-surge-as-cyber-threats-fuels/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/uae-cyberattacks-surge-as-cyber-threats-fuels/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/</a></p><p><a href="https://therecord.media/italian-regulator-fines-financial-giant-36-million" rel="noopener noreferrer" target="_blank">https://therecord.media/italian-regulator-fines-financial-giant-36-million</a></p><p><a href="https://therecord.media/russia-flint-conviction-payment-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-flint-conviction-payment-fraud</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ F5 BIG-IP RCE Exploited in Wild, Fortinet EMS Flaw Attacked, Apple Blocks ClickFix on macOS</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1086: Today's episode will discuss the latest news:</p><ul><li>Hackers Backdoor Telnyx Python SDK in Supply Chain Attack Injecting Malicious Code Into Legitimate Telecom Developer Package </li><li>DeepLoad Malware Uses ClickFix Social Engineering and WMI Persistence for Stealthy Multi-Stage Infection Chains </li><li>Exposed Server Reveals TheGentlemen Ransomware Complete Toolkit Including Builders Playbooks and Attack Infrastructure</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html</a></p><p><a href="https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/</a></p><p><a href="https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html</a></p><p><a href="https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/</a></p><p><a href="https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/</a></p><p><a href="https://thecyberexpress.com/uae-cyberattacks-surge-as-cyber-threats-fuels/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/uae-cyberattacks-surge-as-cyber-threats-fuels/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/</a></p><p><a href="https://therecord.media/italian-regulator-fines-financial-giant-36-million" rel="noopener noreferrer" target="_blank">https://therecord.media/italian-regulator-fines-financial-giant-36-million</a></p><p><a href="https://therecord.media/russia-flint-conviction-payment-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-flint-conviction-payment-fraud</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">77f9f315-d7d5-4b43-939f-28b9ab8d34dc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 31 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/77f9f315-d7d5-4b43-939f-28b9ab8d34dc.mp3" length="16110188" type="audio/mpeg"/><itunes:duration>16:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1086</itunes:episode><podcast:episode>1086</podcast:episode></item><item><title>Handala Hacks FBI Director Patel&apos;s Email, EU Commission AWS Breach 350GB,  RedLine Dev Extradited</title><itunes:title>Handala Hacks FBI Director Patel&apos;s Email, EU Commission AWS Breach 350GB,  RedLine Dev Extradited</itunes:title><description><![CDATA[<p>🎙️ Handala Hacks FBI Director Patel's Email, EU Commission AWS Breach 350GB,  RedLine Dev Extradited</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1085: Today's episode will discuss the latest news:</p><ul><li>Citrix NetScaler ADC and Gateway Instances Actively Exploited as Attackers Target Unpatched Configuration Vulnerabilities </li><li>CISA Flags Critical PTC Vulnerability That Had German Police Mobilized Over Potential Industrial Control System Risk </li><li>New Infinity Stealer Malware Targets macOS Users via ClickFix Social Engineering Lures to Steal Credentials and Crypto Wallets</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/</a></p><p><a href="https://www.securityweek.com/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-personal-account/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-personal-account/</a></p><p><a href="https://www.ynet.co.il/digital/technews/article/r1f110d8jze" rel="noopener noreferrer" target="_blank">https://www.ynet.co.il/digital/technews/article/r1f110d8jze</a></p><p><a href="https://cybersecuritynews.com/citrix-netscaler-instances-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/citrix-netscaler-instances-exploited/</a></p><p><a href="https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/</a></p><p><a href="https://www.cybersecuritydive.com/news/espionage-campaign-telecom-linux-backdoor-China/815978/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/espionage-campaign-telecom-linux-backdoor-China/815978/</a></p><p><a href="https://therecord.media/latvia-accuses-russia-of-disinformation-campaign-ukraine-war" rel="noopener noreferrer" target="_blank">https://therecord.media/latvia-accuses-russia-of-disinformation-campaign-ukraine-war</a></p><p><a href="https://www.securityweek.com/openai-launches-bug-bounty-program-for-abuse-and-safety-risks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-launches-bug-bounty-program-for-abuse-and-safety-risks/</a></p><p><a href="https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years" rel="noopener noreferrer" target="_blank">https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Handala Hacks FBI Director Patel's Email, EU Commission AWS Breach 350GB,  RedLine Dev Extradited</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1085: Today's episode will discuss the latest news:</p><ul><li>Citrix NetScaler ADC and Gateway Instances Actively Exploited as Attackers Target Unpatched Configuration Vulnerabilities </li><li>CISA Flags Critical PTC Vulnerability That Had German Police Mobilized Over Potential Industrial Control System Risk </li><li>New Infinity Stealer Malware Targets macOS Users via ClickFix Social Engineering Lures to Steal Credentials and Crypto Wallets</li></ul><br/><p></p><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/</a></p><p><a href="https://www.securityweek.com/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-personal-account/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-personal-account/</a></p><p><a href="https://www.ynet.co.il/digital/technews/article/r1f110d8jze" rel="noopener noreferrer" target="_blank">https://www.ynet.co.il/digital/technews/article/r1f110d8jze</a></p><p><a href="https://cybersecuritynews.com/citrix-netscaler-instances-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/citrix-netscaler-instances-exploited/</a></p><p><a href="https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/</a></p><p><a href="https://www.cybersecuritydive.com/news/espionage-campaign-telecom-linux-backdoor-China/815978/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/espionage-campaign-telecom-linux-backdoor-China/815978/</a></p><p><a href="https://therecord.media/latvia-accuses-russia-of-disinformation-campaign-ukraine-war" rel="noopener noreferrer" target="_blank">https://therecord.media/latvia-accuses-russia-of-disinformation-campaign-ukraine-war</a></p><p><a href="https://www.securityweek.com/openai-launches-bug-bounty-program-for-abuse-and-safety-risks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-launches-bug-bounty-program-for-abuse-and-safety-risks/</a></p><p><a href="https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years" rel="noopener noreferrer" target="_blank">https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years</a></p><p></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4c004014-053a-48ce-a4d5-06e7c1da2be2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 30 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4c004014-053a-48ce-a4d5-06e7c1da2be2.mp3" length="16233068" type="audio/mpeg"/><itunes:duration>16:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1085</itunes:episode><podcast:episode>1085</podcast:episode></item><item><title>LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw</title><itunes:title>LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw</itunes:title><description><![CDATA[<p>🎙️ LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1084: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TeamPCP Supply Chain Attack Expands From Trivy Scanner to Docker Hub VSCode Marketplace and PyPI in Coordinated OSS Compromise </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercrime Groups Accelerate Speed From Initial Access to Full Compromise Shrinking Breakout Time to Record Lows </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Open Directory Malware Campaign Exposes Threat Actor Infrastructure Hosting RATs Stealers and Exploit Kits</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/china-linked-hackers-breach-southeast-asian-military-systems/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/china-linked-hackers-breach-southeast-asian-military-systems/</a></p><p><a href="https://therecord.media/supply-chain-attack-hits-widely-used-ai-package" rel="noopener noreferrer" target="_blank">https://therecord.media/supply-chain-attack-hits-widely-used-ai-package</a></p><p><a href="https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/</a></p><p><a href="https://www.cybersecuritydive.com/news/cybercrime-groups-speed-initial-access/815551/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cybercrime-groups-speed-initial-access/815551/</a></p><p><a href="https://cybersecuritynews.com/open-directory-malware-campaign/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/open-directory-malware-campaign/</a></p><p><a href="https://cybersecuritynews.com/node-js-patches-multiple-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/node-js-patches-multiple-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/</a></p><p><a href="https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html</a></p><p><a href="https://www.databreachtoday.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189" rel="noopener noreferrer" target="_blank">https://www.databreachtoday.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189</a></p><p><a href="https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1084: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TeamPCP Supply Chain Attack Expands From Trivy Scanner to Docker Hub VSCode Marketplace and PyPI in Coordinated OSS Compromise </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercrime Groups Accelerate Speed From Initial Access to Full Compromise Shrinking Breakout Time to Record Lows </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Open Directory Malware Campaign Exposes Threat Actor Infrastructure Hosting RATs Stealers and Exploit Kits</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/china-linked-hackers-breach-southeast-asian-military-systems/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/china-linked-hackers-breach-southeast-asian-military-systems/</a></p><p><a href="https://therecord.media/supply-chain-attack-hits-widely-used-ai-package" rel="noopener noreferrer" target="_blank">https://therecord.media/supply-chain-attack-hits-widely-used-ai-package</a></p><p><a href="https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/</a></p><p><a href="https://www.cybersecuritydive.com/news/cybercrime-groups-speed-initial-access/815551/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cybercrime-groups-speed-initial-access/815551/</a></p><p><a href="https://cybersecuritynews.com/open-directory-malware-campaign/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/open-directory-malware-campaign/</a></p><p><a href="https://cybersecuritynews.com/node-js-patches-multiple-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/node-js-patches-multiple-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/</a></p><p><a href="https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html</a></p><p><a href="https://www.databreachtoday.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189" rel="noopener noreferrer" target="_blank">https://www.databreachtoday.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189</a></p><p><a href="https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cde7b576-b761-4f48-83b2-b147cf167cb2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 26 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cde7b576-b761-4f48-83b2-b147cf167cb2.mp3" length="15551468" type="audio/mpeg"/><itunes:duration>16:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1084</itunes:episode><podcast:episode>1084</podcast:episode></item><item><title>Pro-Iran Hackers Claim Lockheed Martin Breach, HackerOne Data Stolen, FCC Bans Chinese Routers</title><itunes:title>Pro-Iran Hackers Claim Lockheed Martin Breach, HackerOne Data Stolen, FCC Bans Chinese Routers</itunes:title><description><![CDATA[<p>🎙️ Pro-Iran Hackers Claim Lockheed Martin Breach, HackerOne Data Stolen, FCC Bans Chinese Routers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1083: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Stryker Confirms No Malware Was Used in Handala Attack as Investigators Reveal Intune MDM Was Weaponized to Wipe Devices </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cyberattack Continues to Paralyze Foster City California Government Systems Forcing Manual Operations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Breaches Resolv DeFi Protocol Stealing $25 Million in Cryptocurrency Exploit</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/hackerone-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackerone-data-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/</a></p><p><a href="https://therecord.media/stryker-cyberattack-malware-iran" rel="noopener noreferrer" target="_blank">https://therecord.media/stryker-cyberattack-malware-iran</a></p><p><a href="https://www.govtech.com/security/cyber-attack-continues-to-paralyze-foster-city-calif" rel="noopener noreferrer" target="_blank">https://www.govtech.com/security/cyber-attack-continues-to-paralyze-foster-city-calif</a></p><p><a href="https://therecord.media/hacker-breaches-resolv-defi-25-million" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-breaches-resolv-defi-25-million</a></p><p><a href="https://therecord.media/fcc-routers-banned-security-china" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-routers-banned-security-china</a></p><p><a href="https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-continuously-attacking-ms-sql-servers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-continuously-attacking-ms-sql-servers/</a></p><p><a href="https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/yanluowang-ransomware-access-broker-gets-81-months-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/yanluowang-ransomware-access-broker-gets-81-months-in-prison/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Pro-Iran Hackers Claim Lockheed Martin Breach, HackerOne Data Stolen, FCC Bans Chinese Routers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1083: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Stryker Confirms No Malware Was Used in Handala Attack as Investigators Reveal Intune MDM Was Weaponized to Wipe Devices </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cyberattack Continues to Paralyze Foster City California Government Systems Forcing Manual Operations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Breaches Resolv DeFi Protocol Stealing $25 Million in Cryptocurrency Exploit</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/hackerone-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackerone-data-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/</a></p><p><a href="https://therecord.media/stryker-cyberattack-malware-iran" rel="noopener noreferrer" target="_blank">https://therecord.media/stryker-cyberattack-malware-iran</a></p><p><a href="https://www.govtech.com/security/cyber-attack-continues-to-paralyze-foster-city-calif" rel="noopener noreferrer" target="_blank">https://www.govtech.com/security/cyber-attack-continues-to-paralyze-foster-city-calif</a></p><p><a href="https://therecord.media/hacker-breaches-resolv-defi-25-million" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-breaches-resolv-defi-25-million</a></p><p><a href="https://therecord.media/fcc-routers-banned-security-china" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-routers-banned-security-china</a></p><p><a href="https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-continuously-attacking-ms-sql-servers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-continuously-attacking-ms-sql-servers/</a></p><p><a href="https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/yanluowang-ransomware-access-broker-gets-81-months-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/yanluowang-ransomware-access-broker-gets-81-months-in-prison/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ecb30060-eb99-43a8-bbeb-140e6d15251e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 25 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ecb30060-eb99-43a8-bbeb-140e6d15251e.mp3" length="17011052" type="audio/mpeg"/><itunes:duration>17:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1083</itunes:episode><podcast:episode>1083</podcast:episode></item><item><title>FBI: Iran Hackers Use Telegram as C2, Crunchyroll Probes 6.8M Breach, Tycoon 2FA Back Online</title><itunes:title>FBI: Iran Hackers Use Telegram as C2, Crunchyroll Probes 6.8M Breach, Tycoon 2FA Back Online</itunes:title><description><![CDATA[<p>🎙️ FBI: Iran Hackers Use Telegram as C2, Crunchyroll Probes 6.8M Breach, Tycoon 2FA Back Online</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1082: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Mazda Discloses Security Breach Exposing Employee and Business Partner Data After Unauthorized Network Access </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chip Services Firm Trio-Tech Says Subsidiary Hit by Ransomware Attack Disrupting Operations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TeamPCP Deploys Iran-Targeted Wiper Malware in Kubernetes Container Attacks Marking New Destructive Tactic</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/</a></p><p><a href="https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/</a></p><p><a href="https://cybersecuritynews.com/libyan-oil-refinery-hit-in-long-running-espionage/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/libyan-oil-refinery-hit-in-long-running-espionage/</a></p><p><a href="https://techcrunch.com/2026/03/23/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/23/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/</a></p><p><a href="https://www.insurancejournal.com/news/national/2026/03/23/862863.htm" rel="noopener noreferrer" target="_blank">https://www.insurancejournal.com/news/national/2026/03/23/862863.htm</a></p><p><a href="https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/</a></p><p><a href="https://cybersecuritynews.com/netscaler-adc-and-gateway-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/netscaler-adc-and-gateway-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/</a></p><p><a href="https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html</a></p><p><a href="https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/</a></p><p><a href="https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI: Iran Hackers Use Telegram as C2, Crunchyroll Probes 6.8M Breach, Tycoon 2FA Back Online</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1082: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Mazda Discloses Security Breach Exposing Employee and Business Partner Data After Unauthorized Network Access </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chip Services Firm Trio-Tech Says Subsidiary Hit by Ransomware Attack Disrupting Operations</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TeamPCP Deploys Iran-Targeted Wiper Malware in Kubernetes Container Attacks Marking New Destructive Tactic</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/</a></p><p><a href="https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/</a></p><p><a href="https://cybersecuritynews.com/libyan-oil-refinery-hit-in-long-running-espionage/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/libyan-oil-refinery-hit-in-long-running-espionage/</a></p><p><a href="https://techcrunch.com/2026/03/23/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/23/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/</a></p><p><a href="https://www.insurancejournal.com/news/national/2026/03/23/862863.htm" rel="noopener noreferrer" target="_blank">https://www.insurancejournal.com/news/national/2026/03/23/862863.htm</a></p><p><a href="https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/</a></p><p><a href="https://cybersecuritynews.com/netscaler-adc-and-gateway-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/netscaler-adc-and-gateway-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/</a></p><p><a href="https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html</a></p><p><a href="https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/</a></p><p><a href="https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">17470f95-a120-4b77-9a9c-8d03318eb4a1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 24 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/17470f95-a120-4b77-9a9c-8d03318eb4a1.mp3" length="16095596" type="audio/mpeg"/><itunes:duration>16:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1082</itunes:episode><podcast:episode>1082</podcast:episode></item><item><title>FBI Seizes Handala Websites, Oracle Emergency Patch, Navia Breach Hits 2.7M, 3 Charged for AI Smuggling</title><itunes:title>FBI Seizes Handala Websites, Oracle Emergency Patch, Navia Breach Hits 2.7M, 3 Charged for AI Smuggling</itunes:title><description><![CDATA[<p>🎙️ FBI Seizes Handala Websites, Oracle Emergency Patch, Navia Breach Hits 2.7M, 3 Charged for AI Smuggling</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1081: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AstraZeneca Discloses Data Breach Exposing Patient and Clinical Trial Information After Unauthorized Network Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chrome Security Update Patches 26 Vulnerabilities Including High-Severity Memory Corruption and V8 Flaws </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trivy Vulnerability Scanner Compromised as Infostealer Pushed to Users via Malicious GitHub Actions Workflow</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.cybersecuritydive.com/news/stryker-restoring-ordering-shipping-cyberattack/815040/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/stryker-restoring-ordering-shipping-cyberattack/815040/</a></p><p><a href="https://techcrunch.com/2026/03/19/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/19/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/</a></p><p><a href="https://cybersecuritynews.com/astrazeneca-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/astrazeneca-data-breach/</a></p><p><a href="https://www.securityweek.com/navia-data-breach-impacts-2-7-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/navia-data-breach-impacts-2-7-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/</a></p><p><a href="https://cybersecuritynews.com/chrome-security-update-patches-26-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-security-update-patches-26-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/</a></p><p><a href="https://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/</a></p><p><a href="https://thehackernews.com/2026/03/fbi-warns-russian-hackers-target-signal.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/fbi-warns-russian-hackers-target-signal.html</a></p><p><a href="https://techcrunch.com/2026/03/22/delve-accused-of-misleading-customers-with-fake-compliance/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/22/delve-accused-of-misleading-customers-with-fake-compliance/</a></p><p><a href="https://www.securityweek.com/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI Seizes Handala Websites, Oracle Emergency Patch, Navia Breach Hits 2.7M, 3 Charged for AI Smuggling</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1081: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AstraZeneca Discloses Data Breach Exposing Patient and Clinical Trial Information After Unauthorized Network Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chrome Security Update Patches 26 Vulnerabilities Including High-Severity Memory Corruption and V8 Flaws </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trivy Vulnerability Scanner Compromised as Infostealer Pushed to Users via Malicious GitHub Actions Workflow</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.cybersecuritydive.com/news/stryker-restoring-ordering-shipping-cyberattack/815040/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/stryker-restoring-ordering-shipping-cyberattack/815040/</a></p><p><a href="https://techcrunch.com/2026/03/19/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/19/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/</a></p><p><a href="https://cybersecuritynews.com/astrazeneca-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/astrazeneca-data-breach/</a></p><p><a href="https://www.securityweek.com/navia-data-breach-impacts-2-7-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/navia-data-breach-impacts-2-7-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/</a></p><p><a href="https://cybersecuritynews.com/chrome-security-update-patches-26-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-security-update-patches-26-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/</a></p><p><a href="https://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/</a></p><p><a href="https://thehackernews.com/2026/03/fbi-warns-russian-hackers-target-signal.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/fbi-warns-russian-hackers-target-signal.html</a></p><p><a href="https://techcrunch.com/2026/03/22/delve-accused-of-misleading-customers-with-fake-compliance/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/22/delve-accused-of-misleading-customers-with-fake-compliance/</a></p><p><a href="https://www.securityweek.com/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c227b132-bc38-4c26-8224-1bf82beb0b93</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 23 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c227b132-bc38-4c26-8224-1bf82beb0b93.mp3" length="14823788" type="audio/mpeg"/><itunes:duration>15:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1081</itunes:episode><podcast:episode>1081</podcast:episode></item><item><title>Aura Breached by ShinyHunters, OFAC Sanctions North Korea IT Workers, DarkSword iOS Exploit Kit</title><itunes:title>Aura Breached by ShinyHunters, OFAC Sanctions North Korea IT Workers, DarkSword iOS Exploit Kit</itunes:title><description><![CDATA[<p>🎙️ Aura Breached by ShinyHunters, OFAC Sanctions North Korea IT Workers, DarkSword iOS Exploit Kit</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1080: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Firewall Zero-Day Vulnerability Exploited by Ransomware Operators to Gain Initial Access to Enterprise Networks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ConnectWise Patches Critical ScreenConnect Flaw Allowing Session Hijacking and Unauthorized Remote Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Marquis Ransomware Gang Stole Personal Data of 672K People in 2025 Cyberattack Now Disclosed in Breach Notifications</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/aura-confirms-data-breach-exposing-900-000-marketing-contacts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/aura-confirms-data-breach-exposing-900-000-marketing-contacts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-ransomware-gang-stole-data-of-672-000-people-in-2025-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-ransomware-gang-stole-data-of-672-000-people-in-2025-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-remote-it-worker-ibm-flare/815063/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-remote-it-worker-ibm-flare/815063/</a></p><p><a href="https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html</a></p><p><a href="https://cybersecuritynews.com/cisco-firewall-0-day-ransomware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisco-firewall-0-day-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/</a></p><p><a href="https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/fancybear-server-exposure-reveals-stolen-credentials/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fancybear-server-exposure-reveals-stolen-credentials/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Aura Breached by ShinyHunters, OFAC Sanctions North Korea IT Workers, DarkSword iOS Exploit Kit</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1080: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Firewall Zero-Day Vulnerability Exploited by Ransomware Operators to Gain Initial Access to Enterprise Networks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ConnectWise Patches Critical ScreenConnect Flaw Allowing Session Hijacking and Unauthorized Remote Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Marquis Ransomware Gang Stole Personal Data of 672K People in 2025 Cyberattack Now Disclosed in Breach Notifications</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/aura-confirms-data-breach-exposing-900-000-marketing-contacts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/aura-confirms-data-breach-exposing-900-000-marketing-contacts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-ransomware-gang-stole-data-of-672-000-people-in-2025-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-ransomware-gang-stole-data-of-672-000-people-in-2025-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-remote-it-worker-ibm-flare/815063/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-remote-it-worker-ibm-flare/815063/</a></p><p><a href="https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html</a></p><p><a href="https://cybersecuritynews.com/cisco-firewall-0-day-ransomware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisco-firewall-0-day-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/</a></p><p><a href="https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/fancybear-server-exposure-reveals-stolen-credentials/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fancybear-server-exposure-reveals-stolen-credentials/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c31bae48-e825-4ca5-bfc9-5e1bea73f966</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 19 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c31bae48-e825-4ca5-bfc9-5e1bea73f966.mp3" length="16028780" type="audio/mpeg"/><itunes:duration>16:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1080</itunes:episode><podcast:episode>1080</podcast:episode></item><item><title>Iran Hackers Hold US Network Footholds, GlassWorm Hits 400+ Repos, EU Sanctions China and Iran</title><itunes:title>Iran Hackers Hold US Network Footholds, GlassWorm Hits 400+ Repos, EU Sanctions China and Iran</itunes:title><description><![CDATA[<p>🎙️ Iran Hackers Hold US Network Footholds, GlassWorm Hits 400+ Repos, EU Sanctions China and Iran </p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1079: Today's episode will discuss the latest news:</p><p> • RondoDox Botnet Targets 174 Different Vulnerabilities in Massive Scanning Campaign Across Internet-Facing Devices</p><p> • Google Warns Ransomware Actors Are Shifting Tactics From Encryption to Data Theft Extortion and Multi-Stage Operations</p><p> • New Font Rendering Trick Hides Malicious Commands From AI Security Tools by Exploiting Visual Parsing Gaps </p><p>✅ Story Links: </p><p>https://cybersecuritynews.com/iranian-cyber-ops-maintain-us-network-footholds/ https://www.securityweek.com/rondodox-botnet-targeted-174-vulnerabilities/ https://cybersecuritynews.com/google-warns-ransomware-actors-are-shifting/ https://www.bleepingcomputer.com/news/security/new-font-rendering-trick-hides-malicious-commands-from-ai-tools/ </p><p>https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx/ https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/ https://www.bleepingcomputer.com/news/security/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks/ </p><p>https://www.securityweek.com/google-meta-microsoft-among-signatories-of-pact-to-combat-scams/ </p><p>https://therecord.media/phishing-nba-nfl-scammer-arrested https://therecord.media/energy-department-set-to-release-first-ever-cyber-strategy </p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1 </p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast </p><p>✅ Stay Connected With Us. </p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p>🤝 For Business Inquiries: info@cyberhubpodcast.com </p><p>============================= </p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack https://youtu.be/Q9Hp5beyF18 </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups https://youtube.com/live/JnAdR6FeKPg?feature=share ============================= </p><p>🚀 About The CyberHub Podcast. The Hub of the Infosec Community. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p>For Collaboration and Business inquiries, please use the contact information below: </p><p>📩 Email: info@cyberhubpodcast.com </p><p>================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Iran Hackers Hold US Network Footholds, GlassWorm Hits 400+ Repos, EU Sanctions China and Iran </p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1079: Today's episode will discuss the latest news:</p><p> • RondoDox Botnet Targets 174 Different Vulnerabilities in Massive Scanning Campaign Across Internet-Facing Devices</p><p> • Google Warns Ransomware Actors Are Shifting Tactics From Encryption to Data Theft Extortion and Multi-Stage Operations</p><p> • New Font Rendering Trick Hides Malicious Commands From AI Security Tools by Exploiting Visual Parsing Gaps </p><p>✅ Story Links: </p><p>https://cybersecuritynews.com/iranian-cyber-ops-maintain-us-network-footholds/ https://www.securityweek.com/rondodox-botnet-targeted-174-vulnerabilities/ https://cybersecuritynews.com/google-warns-ransomware-actors-are-shifting/ https://www.bleepingcomputer.com/news/security/new-font-rendering-trick-hides-malicious-commands-from-ai-tools/ </p><p>https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx/ https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/ https://www.bleepingcomputer.com/news/security/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks/ </p><p>https://www.securityweek.com/google-meta-microsoft-among-signatories-of-pact-to-combat-scams/ </p><p>https://therecord.media/phishing-nba-nfl-scammer-arrested https://therecord.media/energy-department-set-to-release-first-ever-cyber-strategy </p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1 </p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast </p><p>✅ Stay Connected With Us. </p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p>🤝 For Business Inquiries: info@cyberhubpodcast.com </p><p>============================= </p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack https://youtu.be/Q9Hp5beyF18 </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups https://youtube.com/live/JnAdR6FeKPg?feature=share ============================= </p><p>🚀 About The CyberHub Podcast. The Hub of the Infosec Community. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p>For Collaboration and Business inquiries, please use the contact information below: </p><p>📩 Email: info@cyberhubpodcast.com </p><p>================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">27c82edd-293a-48ab-815f-5cee545ffe1d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 18 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/27c82edd-293a-48ab-815f-5cee545ffe1d.mp3" length="16923500" type="audio/mpeg"/><itunes:duration>17:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1082</itunes:episode><podcast:episode>1082</podcast:episode></item><item><title>Stryker Hack Used Intune to Wipe 200K Devices, China Espionage Hits Asian Militaries, Wing FTP 0-Day</title><itunes:title>Stryker Hack Used Intune to Wipe 200K Devices, China Espionage Hits Asian Militaries, Wing FTP 0-Day</itunes:title><description><![CDATA[<p>🎙️ Stryker Hack Used Intune to Wipe 200K Devices, China Espionage Hits Asian Militaries, Wing FTP 0-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1078: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Intuitive Surgical Discloses Cyberattack After Phishing Campaign Targets Robotic Surgery Giant's Internal Systems </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Telus Digital Confirms Cyberattack as ShinyHunters Claims Responsibility for Data Theft at Canadian Tech Firm </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UK Companies House Confirms Security Flaw Exposed Business Registration Data Since October 2025</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/</a></p><p><a href="https://cybersecuritynews.com/handala-hack-uses-rdp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/handala-hack-uses-rdp/</a></p><p><a href="https://www.securityweek.com/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/</a></p><p><a href="https://www.cybersecuritydive.com/news/intuitive-surgical-cyberattack-phishing/814746/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/intuitive-surgical-cyberattack-phishing/814746/</a></p><p><a href="https://www.cybersecuritydive.com/news/telus-digital-cyberattack-shinyhunters/814817/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/telus-digital-cyberattack-shinyhunters/814817/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uks-companies-house-confirms-security-flaw-exposed-business-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uks-companies-house-confirms-security-flaw-exposed-business-data/</a></p><p><a href="https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/</a></p><p><a href="https://www.securityweek.com/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/</a></p><p><a href="https://therecord.media/luxembourg-court-overturns-amazon-gdpr-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/luxembourg-court-overturns-amazon-gdpr-fine</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Stryker Hack Used Intune to Wipe 200K Devices, China Espionage Hits Asian Militaries, Wing FTP 0-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1078: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Intuitive Surgical Discloses Cyberattack After Phishing Campaign Targets Robotic Surgery Giant's Internal Systems </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Telus Digital Confirms Cyberattack as ShinyHunters Claims Responsibility for Data Theft at Canadian Tech Firm </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UK Companies House Confirms Security Flaw Exposed Business Registration Data Since October 2025</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/</a></p><p><a href="https://cybersecuritynews.com/handala-hack-uses-rdp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/handala-hack-uses-rdp/</a></p><p><a href="https://www.securityweek.com/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/</a></p><p><a href="https://www.cybersecuritydive.com/news/intuitive-surgical-cyberattack-phishing/814746/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/intuitive-surgical-cyberattack-phishing/814746/</a></p><p><a href="https://www.cybersecuritydive.com/news/telus-digital-cyberattack-shinyhunters/814817/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/telus-digital-cyberattack-shinyhunters/814817/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uks-companies-house-confirms-security-flaw-exposed-business-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uks-companies-house-confirms-security-flaw-exposed-business-data/</a></p><p><a href="https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/</a></p><p><a href="https://www.securityweek.com/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/</a></p><p><a href="https://therecord.media/luxembourg-court-overturns-amazon-gdpr-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/luxembourg-court-overturns-amazon-gdpr-fine</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">71310d98-a208-474d-aa71-dd91e1b16f1a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 17 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/71310d98-a208-474d-aa71-dd91e1b16f1a.mp3" length="16123628" type="audio/mpeg"/><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1079</itunes:episode><podcast:episode>1079</podcast:episode></item><item><title>Chrome Zero-Days Exploited, INTERPOL Sinkholes 45K Ips, Poland Nuclear Center Cyberattacked</title><itunes:title>Chrome Zero-Days Exploited, INTERPOL Sinkholes 45K Ips, Poland Nuclear Center Cyberattacked</itunes:title><description><![CDATA[<p>🎙️ Chrome Zero-Days Exploited, INTERPOL Sinkholes 45K Ips, Poland Nuclear Center Cyberattacked</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1077: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Starbucks Discloses Data Breach After Phishing Attack on Partner Central Portal Exposes SSNs and Financial Data of 889 Employees </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Canadian Grocery Giant Loblaw Confirms Customer Data Breach Exposing Personal Information Across Retail Loyalty Programs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical HPE AOS-CX Network Switch Vulnerability Allows Unauthenticated Attackers to Reset Admin Passwords</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/starbucks-data-breach-impacts-employees/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/starbucks-data-breach-impacts-employees/</a></p><p><a href="https://www.securityweek.com/loblaw-data-breach-impacts-customer-information/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/loblaw-data-breach-impacts-customer-information/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/</a></p><p><a href="https://www.securityweek.com/critical-hpe-aos-cx-vulnerability-allows-admin-password-resets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-hpe-aos-cx-vulnerability-allows-admin-password-resets/</a></p><p><a href="https://cybersecuritynews.com/windows-11-out-of-band-update/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/windows-11-out-of-band-update/</a></p><p><a href="https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/</a></p><p><a href="https://cybersecuritynews.com/fortigate-firewalls-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortigate-firewalls-exploited/</a></p><p><a href="https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html</a></p><p><a href="https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html</a></p><p><a href="https://therecord.media/ransomware-blackcat-doj-incident-responder" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-blackcat-doj-incident-responder</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown/</a></p><p><a href="https://therecord.media/new-york-water-cyber-regulations" rel="noopener noreferrer" target="_blank">https://therecord.media/new-york-water-cyber-regulations</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Chrome Zero-Days Exploited, INTERPOL Sinkholes 45K Ips, Poland Nuclear Center Cyberattacked</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1077: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Starbucks Discloses Data Breach After Phishing Attack on Partner Central Portal Exposes SSNs and Financial Data of 889 Employees </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Canadian Grocery Giant Loblaw Confirms Customer Data Breach Exposing Personal Information Across Retail Loyalty Programs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical HPE AOS-CX Network Switch Vulnerability Allows Unauthenticated Attackers to Reset Admin Passwords</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/starbucks-data-breach-impacts-employees/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/starbucks-data-breach-impacts-employees/</a></p><p><a href="https://www.securityweek.com/loblaw-data-breach-impacts-customer-information/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/loblaw-data-breach-impacts-customer-information/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/</a></p><p><a href="https://www.securityweek.com/critical-hpe-aos-cx-vulnerability-allows-admin-password-resets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-hpe-aos-cx-vulnerability-allows-admin-password-resets/</a></p><p><a href="https://cybersecuritynews.com/windows-11-out-of-band-update/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/windows-11-out-of-band-update/</a></p><p><a href="https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/</a></p><p><a href="https://cybersecuritynews.com/fortigate-firewalls-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortigate-firewalls-exploited/</a></p><p><a href="https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html</a></p><p><a href="https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html</a></p><p><a href="https://therecord.media/ransomware-blackcat-doj-incident-responder" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-blackcat-doj-incident-responder</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown/</a></p><p><a href="https://therecord.media/new-york-water-cyber-regulations" rel="noopener noreferrer" target="_blank">https://therecord.media/new-york-water-cyber-regulations</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">61f6a95e-9b85-4a8a-9a8d-c1a7874e1aff</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 16 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/61f6a95e-9b85-4a8a-9a8d-c1a7874e1aff.mp3" length="17893100" type="audio/mpeg"/><itunes:duration>18:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1078</itunes:episode><podcast:episode>1078</podcast:episode></item><item><title>Iran Hackers Wipe 200K Stryker Devices, FBI Epstein Files Hacked, Wiz Joins Google Cloud</title><itunes:title>Iran Hackers Wipe 200K Stryker Devices, FBI Epstein Files Hacked, Wiz Joins Google Cloud</itunes:title><description><![CDATA[<p>🎙️ Iran Hackers Wipe 200K Stryker Devices, FBI Epstein Files Hacked, Wiz Joins Google Cloud</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1076: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ambulance Provider Data Breach Impacts 235K Patients After Cyberattack Exposes Medical Records and Personal Information </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Michelin Confirms Data Breach Linked to Oracle EBS Hacking Campaign as Cl0p Claims Another Major Victim </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Iran-Linked Hackers Claim Cyberattack on Albanian Parliament Website Amid Widening Regional Cyber Conflict</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/</a></p><p><a href="https://therecord.media/235000-affected-cyberattack-ambulance-provider" rel="noopener noreferrer" target="_blank">https://therecord.media/235000-affected-cyberattack-ambulance-provider</a></p><p><a href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/</a></p><p><a href="https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament</a></p><p><a href="https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/</a></p><p><a href="https://cybersecuritynews.com/active-directory-domain-services-vulnerability-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/active-directory-domain-services-vulnerability-2/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html</a></p><p><a href="https://www.securityweek.com/wiz-joins-google-cloud-as-landmark-acquisition-closes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/wiz-joins-google-cloud-as-landmark-acquisition-closes/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Iran Hackers Wipe 200K Stryker Devices, FBI Epstein Files Hacked, Wiz Joins Google Cloud</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1076: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ambulance Provider Data Breach Impacts 235K Patients After Cyberattack Exposes Medical Records and Personal Information </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Michelin Confirms Data Breach Linked to Oracle EBS Hacking Campaign as Cl0p Claims Another Major Victim </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Iran-Linked Hackers Claim Cyberattack on Albanian Parliament Website Amid Widening Regional Cyber Conflict</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/</a></p><p><a href="https://therecord.media/235000-affected-cyberattack-ambulance-provider" rel="noopener noreferrer" target="_blank">https://therecord.media/235000-affected-cyberattack-ambulance-provider</a></p><p><a href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/</a></p><p><a href="https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament</a></p><p><a href="https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/</a></p><p><a href="https://cybersecuritynews.com/active-directory-domain-services-vulnerability-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/active-directory-domain-services-vulnerability-2/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html</a></p><p><a href="https://www.securityweek.com/wiz-joins-google-cloud-as-landmark-acquisition-closes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/wiz-joins-google-cloud-as-landmark-acquisition-closes/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">564d2d34-4bc0-486c-8f88-8dfbe42d7f90</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 12 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/564d2d34-4bc0-486c-8f88-8dfbe42d7f90.mp3" length="17623916" type="audio/mpeg"/><itunes:duration>18:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1077</itunes:episode><podcast:episode>1077</podcast:episode></item><item><title>Patch Tuesday: 83 Microsoft Fixes, Rudd Confirmed NSA Chief, US-Built iPhone Exploits Hit Russia</title><itunes:title>Patch Tuesday: 83 Microsoft Fixes, Rudd Confirmed NSA Chief, US-Built iPhone Exploits Hit Russia</itunes:title><description><![CDATA[<p>🎙️ Patch Tuesday: 83 Microsoft Fixes, Rudd Confirmed NSA Chief, US-Built iPhone Exploits Hit Russia</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1075: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fortinet Releases Critical Security Updates Addressing Multiple FortiOS FortiProxy and FortiManager Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adobe Patches 80 Vulnerabilities Across Eight Products Including High-Severity Commerce and InDesign Flaws </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Shortens Patch Deadline for Critical Ivanti and SolarWinds Vulnerabilities Flagged as Actively Exploited</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-83-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-83-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/fortinet-security-update-march/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortinet-security-update-march/</a></p><p><a href="https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/</a></p><p><a href="https://therecord.media/cisa-shortens-patch-deadline-ivanti-solarwinds" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-shortens-patch-deadline-ivanti-solarwinds</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-fs-quo-netweaver-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-fs-quo-netweaver-vulnerabilities/</a></p><p><a href="https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/</a></p><p><a href="https://therecord.media/finnish-intel-warns-espionage-china-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/finnish-intel-warns-espionage-china-russia</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/</a></p><p><a href="https://therecord.media/rudd-confirmed-nsa-cyber-command-chief" rel="noopener noreferrer" target="_blank">https://therecord.media/rudd-confirmed-nsa-cyber-command-chief</a></p><p><a href="https://therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech</a></p><p><a href="https://techcrunch.com/2026/03/10/mandiants-founder-just-raised-190m-for-his-autonomous-ai-agent-security-startup/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/10/mandiants-founder-just-raised-190m-for-his-autonomous-ai-agent-security-startup/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Patch Tuesday: 83 Microsoft Fixes, Rudd Confirmed NSA Chief, US-Built iPhone Exploits Hit Russia</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1075: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fortinet Releases Critical Security Updates Addressing Multiple FortiOS FortiProxy and FortiManager Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adobe Patches 80 Vulnerabilities Across Eight Products Including High-Severity Commerce and InDesign Flaws </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Shortens Patch Deadline for Critical Ivanti and SolarWinds Vulnerabilities Flagged as Actively Exploited</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-83-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-83-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/fortinet-security-update-march/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortinet-security-update-march/</a></p><p><a href="https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/</a></p><p><a href="https://therecord.media/cisa-shortens-patch-deadline-ivanti-solarwinds" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-shortens-patch-deadline-ivanti-solarwinds</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-fs-quo-netweaver-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-fs-quo-netweaver-vulnerabilities/</a></p><p><a href="https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/</a></p><p><a href="https://therecord.media/finnish-intel-warns-espionage-china-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/finnish-intel-warns-espionage-china-russia</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/</a></p><p><a href="https://therecord.media/rudd-confirmed-nsa-cyber-command-chief" rel="noopener noreferrer" target="_blank">https://therecord.media/rudd-confirmed-nsa-cyber-command-chief</a></p><p><a href="https://therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech</a></p><p><a href="https://techcrunch.com/2026/03/10/mandiants-founder-just-raised-190m-for-his-autonomous-ai-agent-security-startup/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/10/mandiants-founder-just-raised-190m-for-his-autonomous-ai-agent-security-startup/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2c0b1aec-0d8a-49c5-b502-c947b28191b2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 11 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2c0b1aec-0d8a-49c5-b502-c947b28191b2.mp3" length="17022188" type="audio/mpeg"/><itunes:duration>17:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1076</itunes:episode><podcast:episode>1076</podcast:episode></item><item><title>Trump Releases Cyber Strategy, Russia Phishing Signal &amp; WhatsApp, MuddyWater Hits US Networks</title><itunes:title>Trump Releases Cyber Strategy, Russia Phishing Signal &amp; WhatsApp, MuddyWater Hits US Networks</itunes:title><description><![CDATA[<p>🎙️ Trump Releases Cyber Strategy, Russia Phishing Signal &amp; WhatsApp, MuddyWater Hits US Networks</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1074: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dutch Intelligence Warns Russian State Hackers Running Global Campaign to Hijack Signal and WhatsApp Accounts via Phishing </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ericsson US Discloses Data Breach After Service Provider Hack Exposed Employee and Customer SSNs and Financial Data </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rockwell Automation ICS Vulnerability From 2021 Now Confirmed Exploited in Attacks Affecting PLCs Across Multiple Product Lines</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://therecord.media/trump-cyber-strategy-released-regulations" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-cyber-strategy-released-regulations</a></p><p><a href="https://cybersecuritynews.com/iran-linked-hackers-target-u-s-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/iran-linked-hackers-target-u-s-critical-infrastructure/</a></p><p><a href="https://x.com/astrarce/status/2030677705742536728" rel="noopener noreferrer" target="_blank">https://x.com/astrarce/status/2030677705742536728</a></p><p><a href="https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/</a></p><p><a href="https://www.securityweek.com/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/</a></p><p><a href="https://therecord.media/trump-nominee-nsa-cyber-command-clears-senate-hurdle" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-nominee-nsa-cyber-command-clears-senate-hurdle</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/</a></p><p><a href="https://thecyberexpress.com/online-romance-scams/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/online-romance-scams/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Trump Releases Cyber Strategy, Russia Phishing Signal &amp; WhatsApp, MuddyWater Hits US Networks</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1074: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dutch Intelligence Warns Russian State Hackers Running Global Campaign to Hijack Signal and WhatsApp Accounts via Phishing </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ericsson US Discloses Data Breach After Service Provider Hack Exposed Employee and Customer SSNs and Financial Data </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rockwell Automation ICS Vulnerability From 2021 Now Confirmed Exploited in Attacks Affecting PLCs Across Multiple Product Lines</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://therecord.media/trump-cyber-strategy-released-regulations" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-cyber-strategy-released-regulations</a></p><p><a href="https://cybersecuritynews.com/iran-linked-hackers-target-u-s-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/iran-linked-hackers-target-u-s-critical-infrastructure/</a></p><p><a href="https://x.com/astrarce/status/2030677705742536728" rel="noopener noreferrer" target="_blank">https://x.com/astrarce/status/2030677705742536728</a></p><p><a href="https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/</a></p><p><a href="https://www.securityweek.com/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/</a></p><p><a href="https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/</a></p><p><a href="https://therecord.media/trump-nominee-nsa-cyber-command-clears-senate-hurdle" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-nominee-nsa-cyber-command-clears-senate-hurdle</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/</a></p><p><a href="https://thecyberexpress.com/online-romance-scams/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/online-romance-scams/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">47bcc54c-ca2d-4438-9e07-12ec4a04d9b0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 10 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/47bcc54c-ca2d-4438-9e07-12ec4a04d9b0.mp3" length="16580588" type="audio/mpeg"/><itunes:duration>17:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1075</itunes:episode><podcast:episode>1075</podcast:episode></item><item><title>FBI Wiretap Systems Hacked, Israel Bombs Iran Cyber HQ, Claude Finds 22 Firefox Vulnerabilities</title><itunes:title>FBI Wiretap Systems Hacked, Israel Bombs Iran Cyber HQ, Claude Finds 22 Firefox Vulnerabilities</itunes:title><description><![CDATA[<p>🎙️ FBI Wiretap Systems Hacked, Israel Bombs Iran Cyber HQ, Claude Finds 22 Firefox Vulnerabilities</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1073: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>OpenAI Launches Codex Security Agent After Scanning 1.2 Million Commits and Finding 10,561 High-Severity Issues </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Windows Remote Desktop Services Zero-Day Exploit Being Sold on Dark Web for $220K After February Patch </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Over 100 GitHub Repositories Found Distributing BoryptGrab Infostealer Through Fake Software Projects</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/</a></p><p><a href="https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones" rel="noopener noreferrer" target="_blank">https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/</a></p><p><a href="https://thecyberexpress.com/israel-hit-iran-cyber-warfare-headquarters/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/israel-hit-iran-cyber-warfare-headquarters/</a></p><p><a href="https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html</a></p><p><a href="https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html</a></p><p><a href="https://cybersecuritynews.com/windows-remote-desktop-services-0-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/windows-remote-desktop-services-0-day/</a></p><p><a href="https://www.securityweek.com/over-100-github-repositories-distributing-boryptgrab-stealer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-100-github-repositories-distributing-boryptgrab-stealer/</a></p><p><a href="https://cybersecuritynews.com/rmm-tools-essential-for-it-operations/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/rmm-tools-essential-for-it-operations/</a></p><p><a href="https://www.securityweek.com/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/</a></p><p><a href="https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI Wiretap Systems Hacked, Israel Bombs Iran Cyber HQ, Claude Finds 22 Firefox Vulnerabilities</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1073: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>OpenAI Launches Codex Security Agent After Scanning 1.2 Million Commits and Finding 10,561 High-Severity Issues </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Windows Remote Desktop Services Zero-Day Exploit Being Sold on Dark Web for $220K After February Patch </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Over 100 GitHub Repositories Found Distributing BoryptGrab Infostealer Through Fake Software Projects</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/</a></p><p><a href="https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones" rel="noopener noreferrer" target="_blank">https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/</a></p><p><a href="https://thecyberexpress.com/israel-hit-iran-cyber-warfare-headquarters/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/israel-hit-iran-cyber-warfare-headquarters/</a></p><p><a href="https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html</a></p><p><a href="https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html</a></p><p><a href="https://cybersecuritynews.com/windows-remote-desktop-services-0-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/windows-remote-desktop-services-0-day/</a></p><p><a href="https://www.securityweek.com/over-100-github-repositories-distributing-boryptgrab-stealer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-100-github-repositories-distributing-boryptgrab-stealer/</a></p><p><a href="https://cybersecuritynews.com/rmm-tools-essential-for-it-operations/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/rmm-tools-essential-for-it-operations/</a></p><p><a href="https://www.securityweek.com/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/</a></p><p><a href="https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">911f6fb9-b5b9-41a6-92d0-9169cf1c5db5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 09 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/911f6fb9-b5b9-41a6-92d0-9169cf1c5db5.mp3" length="15539564" type="audio/mpeg"/><itunes:duration>16:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1074</itunes:episode><podcast:episode>1074</podcast:episode></item><item><title>FBI Takes Down LeakBase Forum, Hacked Traffic Cams Aided Iran War, Cisco Max Severity Flaws</title><itunes:title>FBI Takes Down LeakBase Forum, Hacked Traffic Cams Aided Iran War, Cisco Max Severity Flaws</itunes:title><description><![CDATA[<p>🎙️ FBI Takes Down LeakBase Forum, Hacked Traffic Cams Aided Iran War, Cisco Max Severity Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1072: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Hackers Deploy New BadPaw and MeowMeow Malware in Phishing Campaign Targeting Ukraine With Fake Border Permits </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fake LastPass Support Email Threads Use Display Name Spoofing to Redirect Users to Credential Harvesting SSO Pages </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>University of Mississippi Medical Center Reopens 35 Clinics After Nine-Day Ransomware Attack Took Epic EHR Offline</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/</a></p><p><a href="https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/</a></p><p><a href="https://cybersecuritynews.com/escalating-iranian-apt-threats-against-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/escalating-iranian-apt-threats-against-critical-infrastructure/</a></p><p><a href="https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/</a></p><p><a href="https://therecord.media/russian-ukraine-hackers-malware" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-ukraine-hackers-malware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/</a></p><p><a href="https://therecord.media/leakbase-cybercrime-fbi-europe-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/leakbase-cybercrime-fbi-europe-takedown</a></p><p><a href="https://www.securityweek.com/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI Takes Down LeakBase Forum, Hacked Traffic Cams Aided Iran War, Cisco Max Severity Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1072: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Hackers Deploy New BadPaw and MeowMeow Malware in Phishing Campaign Targeting Ukraine With Fake Border Permits </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fake LastPass Support Email Threads Use Display Name Spoofing to Redirect Users to Credential Harvesting SSO Pages </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>University of Mississippi Medical Center Reopens 35 Clinics After Nine-Day Ransomware Attack Took Epic EHR Offline</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/</a></p><p><a href="https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/</a></p><p><a href="https://cybersecuritynews.com/escalating-iranian-apt-threats-against-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/escalating-iranian-apt-threats-against-critical-infrastructure/</a></p><p><a href="https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/</a></p><p><a href="https://therecord.media/russian-ukraine-hackers-malware" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-ukraine-hackers-malware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/</a></p><p><a href="https://therecord.media/leakbase-cybercrime-fbi-europe-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/leakbase-cybercrime-fbi-europe-takedown</a></p><p><a href="https://www.securityweek.com/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f20a7b33-e3c5-4429-af3b-db8539e680c6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 05 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f20a7b33-e3c5-4429-af3b-db8539e680c6.mp3" length="8457644" type="audio/mpeg"/><itunes:duration>17:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1073</itunes:episode><podcast:episode>1073</podcast:episode></item><item><title>Iranian Drones Hit AWS Data Centers, LexisNexis Breached, Pro-Russia Hackers Join Iran Cyber War</title><itunes:title>Iranian Drones Hit AWS Data Centers, LexisNexis Breached, Pro-Russia Hackers Join Iran Cyber War</itunes:title><description><![CDATA[<p>🎙️ Iranian Drones Hit AWS Data Centers, LexisNexis Breached, Pro-Russia Hackers Join Iran Cyber War</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1071: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Western Allies Launch Global Coalition on Telecoms to Shape 6G Security Principles at Mobile World Congress in Barcelona </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New JVG Algorithm Upends Quantum Computing Timelines Making RSA and ECC Decryption Much Closer Than Previously Expected </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Adds VMware Aria Operations Command Injection Flaw CVE-2026-22719 to KEV Catalog After Exploitation Confirmed in the Wild</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/</a></p><p><a href="https://www.securityweek.com/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-physical-disasters/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-physical-disasters/</a></p><p><a href="https://www.securityweek.com/iran-cyber-front-hacktivist-activity-rises-but-state-sponsored-attacks-stay-low/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iran-cyber-front-hacktivist-activity-rises-but-state-sponsored-attacks-stay-low/</a></p><p><a href="https://www.cybersecuritydive.com/news/pro-russia-actors-support-iran-nexus-hackers/813647/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/pro-russia-actors-support-iran-nexus-hackers/813647/</a></p><p><a href="https://therecord.media/western-allies-form-6g-security-coalition" rel="noopener noreferrer" target="_blank">https://therecord.media/western-allies-form-6g-security-coalition</a></p><p><a href="https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/</a></p><p><a href="https://cybersecuritynews.com/hackers-leverage-telegram-for-initial-access/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-leverage-telegram-for-initial-access/</a></p><p><a href="https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Iranian Drones Hit AWS Data Centers, LexisNexis Breached, Pro-Russia Hackers Join Iran Cyber War</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1071: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Western Allies Launch Global Coalition on Telecoms to Shape 6G Security Principles at Mobile World Congress in Barcelona </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New JVG Algorithm Upends Quantum Computing Timelines Making RSA and ECC Decryption Much Closer Than Previously Expected </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Adds VMware Aria Operations Command Injection Flaw CVE-2026-22719 to KEV Catalog After Exploitation Confirmed in the Wild</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/</a></p><p><a href="https://www.securityweek.com/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-physical-disasters/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-physical-disasters/</a></p><p><a href="https://www.securityweek.com/iran-cyber-front-hacktivist-activity-rises-but-state-sponsored-attacks-stay-low/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iran-cyber-front-hacktivist-activity-rises-but-state-sponsored-attacks-stay-low/</a></p><p><a href="https://www.cybersecuritydive.com/news/pro-russia-actors-support-iran-nexus-hackers/813647/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/pro-russia-actors-support-iran-nexus-hackers/813647/</a></p><p><a href="https://therecord.media/western-allies-form-6g-security-coalition" rel="noopener noreferrer" target="_blank">https://therecord.media/western-allies-form-6g-security-coalition</a></p><p><a href="https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/</a></p><p><a href="https://cybersecuritynews.com/hackers-leverage-telegram-for-initial-access/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-leverage-telegram-for-initial-access/</a></p><p><a href="https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">da65af66-18ed-42a1-a25e-94db3baa2124</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 04 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/da65af66-18ed-42a1-a25e-94db3baa2124.mp3" length="8967212" type="audio/mpeg"/><itunes:duration>18:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1072</itunes:episode><podcast:episode>1072</podcast:episode></item><item><title>Cyber Command Disrupts Iran Comms, DHS Warns of Retaliatory Attacks, New CISA Director Named</title><itunes:title>Cyber Command Disrupts Iran Comms, DHS Warns of Retaliatory Attacks, New CISA Director Named</itunes:title><description><![CDATA[<p>🎙️ Cyber Command Disrupts Iran Comms, DHS Warns of Retaliatory Attacks, New CISA Director Named</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1070: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>University of Hawaii Cancer Center Ransomware Attack Exposes SSNs of 1.2 Million People </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Madison Square Garden Confirms Data Breach From Cl0p Oracle EBS Campaign Impacting 131K Individuals </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>APT28 Tied to CVE-2026-21513 MSHTML Zero-Day Exploited to Bypass Mark-of-the-Web Before Patch Tuesday</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/</a></p><p><a href="https://therecord.media/iran-cyber-us-command-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-cyber-us-command-attack</a></p><p><a href="https://abcnews.com/US/department-homeland-security-warns-potential-attacks-wake-iran/story?id=130665784" rel="noopener noreferrer" target="_blank">https://abcnews.com/US/department-homeland-security-warns-potential-attacks-wake-iran/story?id=130665784</a></p><p><a href="https://www.securityweek.com/nick-andersen-appointed-acting-director-of-cisa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nick-andersen-appointed-acting-director-of-cisa/</a></p><p><a href="https://therecord.media/university-of-hawaii-ransomware-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/university-of-hawaii-ransomware-data-breach</a></p><p><a href="https://www.securityweek.com/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/</a></p><p><a href="https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</a></p><p><a href="https://www.securityweek.com/vulnerability-allowed-hijacking-chromes-gemini-live-ai-assistant/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerability-allowed-hijacking-chromes-gemini-live-ai-assistant/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cyber Command Disrupts Iran Comms, DHS Warns of Retaliatory Attacks, New CISA Director Named</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1070: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>University of Hawaii Cancer Center Ransomware Attack Exposes SSNs of 1.2 Million People </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Madison Square Garden Confirms Data Breach From Cl0p Oracle EBS Campaign Impacting 131K Individuals </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>APT28 Tied to CVE-2026-21513 MSHTML Zero-Day Exploited to Bypass Mark-of-the-Web Before Patch Tuesday</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/</a></p><p><a href="https://therecord.media/iran-cyber-us-command-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-cyber-us-command-attack</a></p><p><a href="https://abcnews.com/US/department-homeland-security-warns-potential-attacks-wake-iran/story?id=130665784" rel="noopener noreferrer" target="_blank">https://abcnews.com/US/department-homeland-security-warns-potential-attacks-wake-iran/story?id=130665784</a></p><p><a href="https://www.securityweek.com/nick-andersen-appointed-acting-director-of-cisa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nick-andersen-appointed-acting-director-of-cisa/</a></p><p><a href="https://therecord.media/university-of-hawaii-ransomware-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/university-of-hawaii-ransomware-data-breach</a></p><p><a href="https://www.securityweek.com/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/</a></p><p><a href="https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</a></p><p><a href="https://www.securityweek.com/vulnerability-allowed-hijacking-chromes-gemini-live-ai-assistant/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerability-allowed-hijacking-chromes-gemini-live-ai-assistant/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f1e2f74d-eaa8-48c8-ba31-9738c3359bb7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 03 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f1e2f74d-eaa8-48c8-ba31-9738c3359bb7.mp3" length="7471340" type="audio/mpeg"/><itunes:duration>15:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1071</itunes:episode><podcast:episode>1071</podcast:episode></item><item><title>Cyber Ops Strike Iran Amid US-Israeli Attacks, Canadian Tire 38M Breach, Intellexa Gets 8 Years</title><itunes:title>Cyber Ops Strike Iran Amid US-Israeli Attacks, Canadian Tire 38M Breach, Intellexa Gets 8 Years</itunes:title><description><![CDATA[<p>🎙️ Cyber Ops Strike Iran Amid US-Israeli Attacks, Canadian Tire 38M Breach, Intellexa Gets 8 Years</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1069: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ClawJacked Flaw in OpenClaw AI Agent Lets Any Website Silently Hijack Local Installations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Senator Wyden Blocks Lt Gen Rudd NSA and Cyber Command Confirmation Citing Lack of Qualifications </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chilean Carding Shop Operator Extradited to US for Trafficking 26,000 Stolen Cards via Telegram"       </li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.reuters.com/business/media-telecom/hackers-hit-iranian-apps-websites-after-us-israeli-strikes-2026-03-01/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/media-telecom/hackers-hit-iranian-apps-websites-after-us-israeli-strikes-2026-03-01/</a></p><p><a href="https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/</a></p><p><a href="https://therecord.media/spyware-intellexa-greece-sentenced" rel="noopener noreferrer" target="_blank">https://therecord.media/spyware-intellexa-greece-sentenced</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/</a></p><p><a href="https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command</a></p><p><a href="https://www.securityweek.com/chilean-carding-shop-operator-extradited-to-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chilean-carding-shop-operator-extradited-to-us/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cyber Ops Strike Iran Amid US-Israeli Attacks, Canadian Tire 38M Breach, Intellexa Gets 8 Years</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1069: Today's episode will discuss the latest news:    </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ClawJacked Flaw in OpenClaw AI Agent Lets Any Website Silently Hijack Local Installations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Senator Wyden Blocks Lt Gen Rudd NSA and Cyber Command Confirmation Citing Lack of Qualifications </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chilean Carding Shop Operator Extradited to US for Trafficking 26,000 Stolen Cards via Telegram"       </li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.reuters.com/business/media-telecom/hackers-hit-iranian-apps-websites-after-us-israeli-strikes-2026-03-01/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/media-telecom/hackers-hit-iranian-apps-websites-after-us-israeli-strikes-2026-03-01/</a></p><p><a href="https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/</a></p><p><a href="https://therecord.media/spyware-intellexa-greece-sentenced" rel="noopener noreferrer" target="_blank">https://therecord.media/spyware-intellexa-greece-sentenced</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/</a></p><p><a href="https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command</a></p><p><a href="https://www.securityweek.com/chilean-carding-shop-operator-extradited-to-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chilean-carding-shop-operator-extradited-to-us/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fc026346-3626-4700-9874-ecacdc5ab659</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 02 Mar 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fc026346-3626-4700-9874-ecacdc5ab659.mp3" length="7943852" type="audio/mpeg"/><itunes:duration>16:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1070</itunes:episode><podcast:episode>1070</podcast:episode></item><item><title>Cisco SD-WAN CVSS 10 Zero-Day Since 2023, Claude AI Hacks Mexico Govt, China Spies 42 Countries</title><itunes:title>Cisco SD-WAN CVSS 10 Zero-Day Since 2023, Claude AI Hacks Mexico Govt, China Spies 42 Countries</itunes:title><description><![CDATA[<p>🎙️ Cisco SD-WAN CVSS 10 Zero-Day Since 2023, Claude AI Hacks Mexico Govt, China Spies 42 Countries</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1068: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Disrupts Chinese UNC2814 Espionage Campaign That Breached 53 Organizations Across 42 Countries Using Google Sheets as Command and Control </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fintech Giant Marquis Sues SonicWall Alleging Cloud Backup Breach Exposed Firewall Configs and Scratch Codes Leading to Ransomware Attack Affecting 400K People </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SolarWinds Patches Four Critical CVSS 9.1 Serv-U Vulnerabilities That Could Allow Attackers to Execute Code as Root</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/google-disrupts-chinese-cyberespionage-campaign-targeting-telecoms-governments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-disrupts-chinese-cyberespionage-campaign-targeting-telecoms-governments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/</a></p><p><a href="https://www.securityweek.com/solarwinds-patches-four-critical-serv-u-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solarwinds-patches-four-critical-serv-u-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/claude-ai-exploited-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-ai-exploited-2/</a></p><p><a href="https://therecord.media/china-domestic-ip-theft-crackdown" rel="noopener noreferrer" target="_blank">https://therecord.media/china-domestic-ip-theft-crackdown</a></p><p><a href="https://www.popsci.com/technology/robot-vacuum-army/" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/robot-vacuum-army/</a></p><p><a href="https://www.securityweek.com/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/</a></p><p><a href="https://www.bankinfosecurity.com/startup-astelia-secures-35m-for-ai-vulnerability-management-a-30843" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/startup-astelia-secures-35m-for-ai-vulnerability-management-a-30843</a></p><p><a href="https://therecord.media/powerschool-cps-settle-proposed-class-action" rel="noopener noreferrer" target="_blank">https://therecord.media/powerschool-cps-settle-proposed-class-action</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cisco SD-WAN CVSS 10 Zero-Day Since 2023, Claude AI Hacks Mexico Govt, China Spies 42 Countries</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1068: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Disrupts Chinese UNC2814 Espionage Campaign That Breached 53 Organizations Across 42 Countries Using Google Sheets as Command and Control </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fintech Giant Marquis Sues SonicWall Alleging Cloud Backup Breach Exposed Firewall Configs and Scratch Codes Leading to Ransomware Attack Affecting 400K People </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SolarWinds Patches Four Critical CVSS 9.1 Serv-U Vulnerabilities That Could Allow Attackers to Execute Code as Root</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/google-disrupts-chinese-cyberespionage-campaign-targeting-telecoms-governments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-disrupts-chinese-cyberespionage-campaign-targeting-telecoms-governments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/</a></p><p><a href="https://www.securityweek.com/solarwinds-patches-four-critical-serv-u-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solarwinds-patches-four-critical-serv-u-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/claude-ai-exploited-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-ai-exploited-2/</a></p><p><a href="https://therecord.media/china-domestic-ip-theft-crackdown" rel="noopener noreferrer" target="_blank">https://therecord.media/china-domestic-ip-theft-crackdown</a></p><p><a href="https://www.popsci.com/technology/robot-vacuum-army/" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/robot-vacuum-army/</a></p><p><a href="https://www.securityweek.com/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/</a></p><p><a href="https://www.bankinfosecurity.com/startup-astelia-secures-35m-for-ai-vulnerability-management-a-30843" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/startup-astelia-secures-35m-for-ai-vulnerability-management-a-30843</a></p><p><a href="https://therecord.media/powerschool-cps-settle-proposed-class-action" rel="noopener noreferrer" target="_blank">https://therecord.media/powerschool-cps-settle-proposed-class-action</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7601a50f-9453-4313-8372-4fdd67b3c20c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 26 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7601a50f-9453-4313-8372-4fdd67b3c20c.mp3" length="8674796" type="audio/mpeg"/><itunes:duration>18:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1069</itunes:episode><podcast:episode>1069</podcast:episode></item><item><title>US Sanctions Russian Exploit Broker Operation Zero, Lazarus Deploys Medusa, ShinyHunters Strikes</title><itunes:title>US Sanctions Russian Exploit Broker Operation Zero, Lazarus Deploys Medusa, ShinyHunters Strikes</itunes:title><description><![CDATA[<p>🎙️ US Sanctions Russian Exploit Broker Operation Zero, Lazarus Deploys Medusa, ShinyHunters Strikes</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1067: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wynn Resorts Confirms Employee Data Breach After ShinyHunters Demands $1.5 Million Bitcoin Ransom for 800K Stolen Records </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Linked Diesel Vortex Group Steals 1,649 Credentials from US and European Freight and Logistics Companies </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>65 Percent of Financial Organizations Hit by Ransomware in 2024 as Average Recovery Costs Reach $2.73 Million</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cargurus-data-breach-exposes-information-of-124-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cargurus-data-breach-exposes-information-of-124-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/</a></p><p><a href="https://cybersecuritynews.com/financial-organizations-ransomware-attack-2024/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/financial-organizations-ransomware-attack-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/</a></p><p><a href="https://www.securityweek.com/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/</a></p><p><a href="https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/</a></p><p><a href="https://therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds</a></p><p><a href="https://cybersecuritynews.com/reddit-fined-14-47-million/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/reddit-fined-14-47-million/</a></p><p><a href="https://therecord.media/sanctions-russian-exploit-broker-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/sanctions-russian-exploit-broker-cyber</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ US Sanctions Russian Exploit Broker Operation Zero, Lazarus Deploys Medusa, ShinyHunters Strikes</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1067: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wynn Resorts Confirms Employee Data Breach After ShinyHunters Demands $1.5 Million Bitcoin Ransom for 800K Stolen Records </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Linked Diesel Vortex Group Steals 1,649 Credentials from US and European Freight and Logistics Companies </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>65 Percent of Financial Organizations Hit by Ransomware in 2024 as Average Recovery Costs Reach $2.73 Million</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cargurus-data-breach-exposes-information-of-124-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cargurus-data-breach-exposes-information-of-124-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/</a></p><p><a href="https://cybersecuritynews.com/financial-organizations-ransomware-attack-2024/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/financial-organizations-ransomware-attack-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/</a></p><p><a href="https://www.securityweek.com/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/</a></p><p><a href="https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/</a></p><p><a href="https://therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds</a></p><p><a href="https://cybersecuritynews.com/reddit-fined-14-47-million/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/reddit-fined-14-47-million/</a></p><p><a href="https://therecord.media/sanctions-russian-exploit-broker-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/sanctions-russian-exploit-broker-cyber</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5c3a8af2-b4e1-4e4d-859b-70ea1db29995</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 24 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5c3a8af2-b4e1-4e4d-859b-70ea1db29995.mp3" length="7396652" type="audio/mpeg"/><itunes:duration>15:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1068</itunes:episode><podcast:episode>1068</podcast:episode></item><item><title>Chinese AI Labs Steal Claude with 16M Exchanges, Ukraine Hacks Guide Missile Strikes, Conduent 25M</title><itunes:title>Chinese AI Labs Steal Claude with 16M Exchanges, Ukraine Hacks Guide Missile Strikes, Conduent 25M</itunes:title><description><![CDATA[<p>🎙️ Chinese AI Labs Steal Claude with 16M Exchanges, Ukraine Hacks Guide Missile Strikes, Conduent 25M</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1066: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UAE Blocks AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure and Vital Sectors </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Exploit Microsoft Entra Device Code Vishing to Bypass MFA and Hijack Corporate Accounts </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FBI Warns ATM Jackpotting Surged to 700 Attacks in 2025 with Over $20 Million in Losses Using Ploutus Malware</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/anthropic-claude-under-large-scale-distillation-attacks/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/anthropic-claude-under-large-scale-distillation-attacks/</a></p><p><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes</a></p><p><a href="https://thecyberexpress.com/uae-blocked-ai-powered-terrorist-cyberattacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/uae-blocked-ai-powered-terrorist-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/</a></p><p><a href="https://thecyberexpress.com/fbi-flags-rise-in-atm-jackpotting-attacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fbi-flags-rise-in-atm-jackpotting-attacks/</a></p><p><a href="https://cybersecuritynews.com/conduent-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/conduent-data-breach/</a></p><p><a href="https://therecord.media/air-cote-divoire-confirms-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/air-cote-divoire-confirms-cyberattack</a></p><p><a href="https://www.databreachtoday.com/white-house-rolls-out-global-ai-initiatives-a-30834" rel="noopener noreferrer" target="_blank">https://www.databreachtoday.com/white-house-rolls-out-global-ai-initiatives-a-30834</a></p><p><a href="https://www.securityweek.com/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/</a></p><p><a href="https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Chinese AI Labs Steal Claude with 16M Exchanges, Ukraine Hacks Guide Missile Strikes, Conduent 25M</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1066: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UAE Blocks AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure and Vital Sectors </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Exploit Microsoft Entra Device Code Vishing to Bypass MFA and Hijack Corporate Accounts </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FBI Warns ATM Jackpotting Surged to 700 Attacks in 2025 with Over $20 Million in Losses Using Ploutus Malware</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://cybersecuritynews.com/anthropic-claude-under-large-scale-distillation-attacks/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/anthropic-claude-under-large-scale-distillation-attacks/</a></p><p><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes</a></p><p><a href="https://thecyberexpress.com/uae-blocked-ai-powered-terrorist-cyberattacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/uae-blocked-ai-powered-terrorist-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/</a></p><p><a href="https://thecyberexpress.com/fbi-flags-rise-in-atm-jackpotting-attacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fbi-flags-rise-in-atm-jackpotting-attacks/</a></p><p><a href="https://cybersecuritynews.com/conduent-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/conduent-data-breach/</a></p><p><a href="https://therecord.media/air-cote-divoire-confirms-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/air-cote-divoire-confirms-cyberattack</a></p><p><a href="https://www.databreachtoday.com/white-house-rolls-out-global-ai-initiatives-a-30834" rel="noopener noreferrer" target="_blank">https://www.databreachtoday.com/white-house-rolls-out-global-ai-initiatives-a-30834</a></p><p><a href="https://www.securityweek.com/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/</a></p><p><a href="https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">29c827fa-2c18-4bdb-a617-c38eedae12c3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 24 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/29c827fa-2c18-4bdb-a617-c38eedae12c3.mp3" length="8717420" type="audio/mpeg"/><itunes:duration>18:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1067</itunes:episode><podcast:episode>1067</podcast:episode></item><item><title>AI Hacker Breaches 600 Firewalls in 5 Weeks, Hospital Ransomware Closes 35 Clinics, Volt Typhoon</title><itunes:title>AI Hacker Breaches 600 Firewalls in 5 Weeks, Hospital Ransomware Closes 35 Clinics, Volt Typhoon</itunes:title><description><![CDATA[<p>🎙️ AI Hacker Breaches 600 Firewalls in 5 Weeks, Hospital Ransomware Closes 35 Clinics, Volt Typhoon</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1065: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Anthropic Claude Code Security Launch Crashes Cybersecurity Stocks with CrowdStrike Down 8 Percent and ETF at Lowest Since 2023 </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Confirms BeyondTrust CVE-2026-1731 Now Exploited in Active Ransomware Campaigns Across Multiple Sectors </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dutch Intelligence Warns Russia Stepping Up Hybrid Cyber Warfare Against Europe Below Threshold of Open Conflict</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/</a></strong></p><p><strong><a href="https://www.securityweek.com/chip-testing-giant-advantest-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chip-testing-giant-advantest-hit-by-ransomware/</a></strong></p><p><strong><a href="https://therecord.media/cheyenne-arapaho-ransomware-rhysida" rel="noopener noreferrer" target="_blank">https://therecord.media/cheyenne-arapaho-ransomware-rhysida</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/</a></strong></p><p><strong><a href="https://therecord.media/hackers-breach-ukraine-national-bank-contractor" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-breach-ukraine-national-bank-contractor</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/</a></strong></p><p><strong><a href="https://therecord.media/russia-cyberattacks-europe-warfare" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cyberattacks-europe-warfare</a></strong></p><p><strong><a href="https://cybersecuritynews.com/claude-security-tool-stocks-impacted/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-security-tool-stocks-impacted/</a></strong></p><p><strong><a href="https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/</a></strong></p><p><strong><a href="https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ AI Hacker Breaches 600 Firewalls in 5 Weeks, Hospital Ransomware Closes 35 Clinics, Volt Typhoon</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1065: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Anthropic Claude Code Security Launch Crashes Cybersecurity Stocks with CrowdStrike Down 8 Percent and ETF at Lowest Since 2023 </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Confirms BeyondTrust CVE-2026-1731 Now Exploited in Active Ransomware Campaigns Across Multiple Sectors </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dutch Intelligence Warns Russia Stepping Up Hybrid Cyber Warfare Against Europe Below Threshold of Open Conflict</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/</a></strong></p><p><strong><a href="https://www.securityweek.com/chip-testing-giant-advantest-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chip-testing-giant-advantest-hit-by-ransomware/</a></strong></p><p><strong><a href="https://therecord.media/cheyenne-arapaho-ransomware-rhysida" rel="noopener noreferrer" target="_blank">https://therecord.media/cheyenne-arapaho-ransomware-rhysida</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/</a></strong></p><p><strong><a href="https://therecord.media/hackers-breach-ukraine-national-bank-contractor" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-breach-ukraine-national-bank-contractor</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/</a></strong></p><p><strong><a href="https://therecord.media/russia-cyberattacks-europe-warfare" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cyberattacks-europe-warfare</a></strong></p><p><strong><a href="https://cybersecuritynews.com/claude-security-tool-stocks-impacted/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-security-tool-stocks-impacted/</a></strong></p><p><strong><a href="https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/</a></strong></p><p><strong><a href="https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d52aa423-754a-47c6-8273-f3fa16f357cd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 23 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d52aa423-754a-47c6-8273-f3fa16f357cd.mp3" length="6606956" type="audio/mpeg"/><itunes:duration>13:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1066</itunes:episode><podcast:episode>1066</podcast:episode></item><item><title>Texas Sues TP-Link Over China Ties, AI Used as Malware C2, Poland Bans Chinese Cars at Bases</title><itunes:title>Texas Sues TP-Link Over China Ties, AI Used as Malware C2, Poland Bans Chinese Cars at Bases</itunes:title><description><![CDATA[<p>🎙️ Texas Sues TP-Link Over China Ties, AI Used as Malware C2, Poland Bans Chinese Cars at Bases</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1064: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Breach of Fintech Firm Figure Exposes Nearly One Million Accounts Including Names Addresses and Dates of Birth </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Warns Hackers Exploiting Vulnerability in Taiwan Security Firm TeamT5 ThreatSonar Anti-Ransomware Product Adding CVE-2024-7694 to KEV Catalog </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Attackers Deploy Dormant Backdoors in Ivanti EPMM Targeting 4,400 Exposed Instances Across Government Healthcare and Manufacturing Sectors</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/</a></p><p><a href="https://www.securityweek.com/cisa-hackers-exploiting-vulnerability-in-product-of-taiwan-security-firm-teamt5/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-hackers-exploiting-vulnerability-in-product-of-taiwan-security-firm-teamt5/</a></p><p><a href="https://therecord.media/poland-bans-chinese-made-cars-from-military-sites" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-bans-chinese-made-cars-from-military-sites</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/</a></p><p><a href="https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/</a></p><p><a href="https://therecord.media/texas-sues-tp-link-china-allegations" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-sues-tp-link-china-allegations</a></p><p><a href="https://cybersecuritynews.com/openai-evmbench/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/openai-evmbench/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-to-acquire-koi-in-reported-400-million-transaction/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-to-acquire-koi-in-reported-400-million-transaction/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Texas Sues TP-Link Over China Ties, AI Used as Malware C2, Poland Bans Chinese Cars at Bases</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1064: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Breach of Fintech Firm Figure Exposes Nearly One Million Accounts Including Names Addresses and Dates of Birth </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Warns Hackers Exploiting Vulnerability in Taiwan Security Firm TeamT5 ThreatSonar Anti-Ransomware Product Adding CVE-2024-7694 to KEV Catalog </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Attackers Deploy Dormant Backdoors in Ivanti EPMM Targeting 4,400 Exposed Instances Across Government Healthcare and Manufacturing Sectors</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/</a></p><p><a href="https://www.securityweek.com/cisa-hackers-exploiting-vulnerability-in-product-of-taiwan-security-firm-teamt5/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-hackers-exploiting-vulnerability-in-product-of-taiwan-security-firm-teamt5/</a></p><p><a href="https://therecord.media/poland-bans-chinese-made-cars-from-military-sites" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-bans-chinese-made-cars-from-military-sites</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/</a></p><p><a href="https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/</a></p><p><a href="https://therecord.media/texas-sues-tp-link-china-allegations" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-sues-tp-link-china-allegations</a></p><p><a href="https://cybersecuritynews.com/openai-evmbench/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/openai-evmbench/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-to-acquire-koi-in-reported-400-million-transaction/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-to-acquire-koi-in-reported-400-million-transaction/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fff1591f-232c-441c-870c-0f35a67fde56</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 19 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fff1591f-232c-441c-870c-0f35a67fde56.mp3" length="7414508" type="audio/mpeg"/><itunes:duration>15:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1065</itunes:episode><podcast:episode>1065</podcast:episode></item><item><title>Chinese Hackers Exploit Dell Zero-Day, Android Firmware Backdoor, Spain Orders VPN Block</title><itunes:title>Chinese Hackers Exploit Dell Zero-Day, Android Firmware Backdoor, Spain Orders VPN Block</itunes:title><description><![CDATA[<p>🎙️ Chinese Hackers Exploit Dell Zero-Day, Android Firmware Backdoor, Spain Orders VPN Block</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1063: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hackers Target Supporters of Iran Protests with New CRESCENTHARVEST Espionage Malware Disguised as Protest Footage </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Polish Police Arrest 47-Year-Old Man Linked to Phobos Ransomware Group as Part of Europol Operation Aether </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Flaws in Popular VSCode Extensions Expose Millions of Developers to Supply Chain Attacks</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/</a></p><p><a href="https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/</a></p><p><a href="https://www.securityweek.com/api-threats-grow-in-scale-as-ai-expands-the-blast-radius/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/api-threats-grow-in-scale-as-ai-expands-the-blast-radius/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/</a></p><p><a href="https://www.securityweek.com/password-managers-vulnerable-to-vault-compromise-under-malicious-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/password-managers-vulnerable-to-vault-compromise-under-malicious-server/</a></p><p><a href="https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html</a></p><p><a href="https://cybersecuritynews.com/credit-card-fraud-emerges/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/credit-card-fraud-emerges/</a></p><p><a href="https://therecord.media/spyware-kenya-cellebrite-activist" rel="noopener noreferrer" target="_blank">https://therecord.media/spyware-kenya-cellebrite-activist</a></p><p><a href="https://www.securityweek.com/man-linked-to-phobos-ransomware-arrested-in-poland/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/man-linked-to-phobos-ransomware-arrested-in-poland/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Chinese Hackers Exploit Dell Zero-Day, Android Firmware Backdoor, Spain Orders VPN Block</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1063: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hackers Target Supporters of Iran Protests with New CRESCENTHARVEST Espionage Malware Disguised as Protest Footage </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Polish Police Arrest 47-Year-Old Man Linked to Phobos Ransomware Group as Part of Europol Operation Aether </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Flaws in Popular VSCode Extensions Expose Millions of Developers to Supply Chain Attacks</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/</a></p><p><a href="https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/</a></p><p><a href="https://www.securityweek.com/api-threats-grow-in-scale-as-ai-expands-the-blast-radius/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/api-threats-grow-in-scale-as-ai-expands-the-blast-radius/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/</a></p><p><a href="https://www.securityweek.com/password-managers-vulnerable-to-vault-compromise-under-malicious-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/password-managers-vulnerable-to-vault-compromise-under-malicious-server/</a></p><p><a href="https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html</a></p><p><a href="https://cybersecuritynews.com/credit-card-fraud-emerges/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/credit-card-fraud-emerges/</a></p><p><a href="https://therecord.media/spyware-kenya-cellebrite-activist" rel="noopener noreferrer" target="_blank">https://therecord.media/spyware-kenya-cellebrite-activist</a></p><p><a href="https://www.securityweek.com/man-linked-to-phobos-ransomware-arrested-in-poland/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/man-linked-to-phobos-ransomware-arrested-in-poland/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8e0e7133-393a-4bd5-a882-f423753f36bb</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 18 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8e0e7133-393a-4bd5-a882-f423753f36bb.mp3" length="8810732" type="audio/mpeg"/><itunes:duration>18:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1064</itunes:episode><podcast:episode>1064</podcast:episode></item><item><title>Russia Loses Starlink on Battlefield, CISA at 38% in DHS Shutdown, First Chrome Zero-Day of 2026</title><itunes:title>Russia Loses Starlink on Battlefield, CISA at 38% in DHS Shutdown, First Chrome Zero-Day of 2026</itunes:title><description><![CDATA[<p>🎙️ Russia Loses Starlink on Battlefield, CISA at 38% in DHS Shutdown, First Chrome Zero-Day of 2026</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1062: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Canada Goose 600K records leaked by ShinyHunters  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Infostealer now targeting OpenClaw AI agent configs  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>500K VKontakte accounts hijacked via Chrome extensions</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/</a></p><p><a href="https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions" rel="noopener noreferrer" target="_blank">https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/</a></p><p><a href="https://therecord.media/starlink-restrictions-hit-russian-forces" rel="noopener noreferrer" target="_blank">https://therecord.media/starlink-restrictions-hit-russian-forces</a></p><p><a href="https://www.securityweek.com/google-patches-first-actively-exploited-chrome-zero-day-of-2026/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-first-actively-exploited-chrome-zero-day-of-2026/</a></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/</a></strong></p><p><a href="https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html</a></p><p><a href="https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Russia Loses Starlink on Battlefield, CISA at 38% in DHS Shutdown, First Chrome Zero-Day of 2026</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1062: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Canada Goose 600K records leaked by ShinyHunters  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Infostealer now targeting OpenClaw AI agent configs  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>500K VKontakte accounts hijacked via Chrome extensions</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/</a></p><p><a href="https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions" rel="noopener noreferrer" target="_blank">https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/</a></p><p><a href="https://therecord.media/starlink-restrictions-hit-russian-forces" rel="noopener noreferrer" target="_blank">https://therecord.media/starlink-restrictions-hit-russian-forces</a></p><p><a href="https://www.securityweek.com/google-patches-first-actively-exploited-chrome-zero-day-of-2026/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-first-actively-exploited-chrome-zero-day-of-2026/</a></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/</a></strong></p><p><a href="https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html</a></p><p><a href="https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a6ba26cb-742a-4ea5-a31f-2c60b15a1935</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 17 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a6ba26cb-742a-4ea5-a31f-2c60b15a1935.mp3" length="7146284" type="audio/mpeg"/><itunes:duration>14:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1063</itunes:episode><podcast:episode>1063</podcast:episode></item><item><title>300+ Chrome Extensions Steal Data from 37M Users, LVMH Brands Fined $25M, 6M Dutch Records Stolen</title><itunes:title>300+ Chrome Extensions Steal Data from 37M Users, LVMH Brands Fined $25M, 6M Dutch Records Stolen</itunes:title><description><![CDATA[<p>🎙️ 300+ Chrome Extensions Steal Data from 37M Users, LVMH Brands Fined $25M, 6M Dutch Records Stolen</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1061: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Links China Iran Russia and North Korea to Coordinated Cyber Operations Targeting the Defense Industrial Base </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Ties Suspected Russian Intelligence Actor to CANFAIL Malware Attacks on Ukrainian Defense and Energy Organizations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>NATO Deputy Secretary General Calls for Imposing Real Costs on Russia and China Over Cyber and Hybrid Attacks at Munich Conference</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/dutch-carrier-odido-discloses-data-breach-impacting-6-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dutch-carrier-odido-discloses-data-breach-impacting-6-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/</a></p><p><a href="https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary</a></p><p><a href="https://therecord.media/usa-cyber-actors-consequences" rel="noopener noreferrer" target="_blank">https://therecord.media/usa-cyber-actors-consequences</a></p><p><a href="https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-job-recruiters-hide-malware-in-developer-coding-challenges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-job-recruiters-hide-malware-in-developer-coding-challenges/</a></p><p><a href="https://www.securityweek.com/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/</a></p><p><a href="https://cybersecuritynews.com/opensea-0-day-exploit-chain/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/opensea-0-day-exploit-chain/</a></p><p><a href="https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html</a></p><p><a href="https://www.securityweek.com/check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 300+ Chrome Extensions Steal Data from 37M Users, LVMH Brands Fined $25M, 6M Dutch Records Stolen</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1061: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Links China Iran Russia and North Korea to Coordinated Cyber Operations Targeting the Defense Industrial Base </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Google Ties Suspected Russian Intelligence Actor to CANFAIL Malware Attacks on Ukrainian Defense and Energy Organizations </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>NATO Deputy Secretary General Calls for Imposing Real Costs on Russia and China Over Cyber and Hybrid Attacks at Munich Conference</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/dutch-carrier-odido-discloses-data-breach-impacting-6-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dutch-carrier-odido-discloses-data-breach-impacting-6-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/</a></p><p><a href="https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary</a></p><p><a href="https://therecord.media/usa-cyber-actors-consequences" rel="noopener noreferrer" target="_blank">https://therecord.media/usa-cyber-actors-consequences</a></p><p><a href="https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-job-recruiters-hide-malware-in-developer-coding-challenges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-job-recruiters-hide-malware-in-developer-coding-challenges/</a></p><p><a href="https://www.securityweek.com/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/</a></p><p><a href="https://cybersecuritynews.com/opensea-0-day-exploit-chain/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/opensea-0-day-exploit-chain/</a></p><p><a href="https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html</a></p><p><a href="https://www.securityweek.com/check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">bad4c5cc-9f9b-4391-8d00-27e3c2b5bdaa</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 16 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/bad4c5cc-9f9b-4391-8d00-27e3c2b5bdaa.mp3" length="8535020" type="audio/mpeg"/><itunes:duration>17:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1062</itunes:episode><podcast:episode>1062</podcast:episode></item><item><title>Apple Patches Exploited Zero-Day, $2K Spyware Hacks Any Phone, First Malicious Outlook Add-In</title><itunes:title>Apple Patches Exploited Zero-Day, $2K Spyware Hacks Any Phone, First Malicious Outlook Add-In</itunes:title><description><![CDATA[<p>🎙️ Apple Patches Exploited Zero-Day, $2K Spyware Hacks Any Phone, First Malicious Outlook Add-In</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1060: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Crazy Ransomware Gang Abuses Employee Monitoring Tool and SimpleHelp RMM for Persistence </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese-Linked VoidLink AI-Generated Malware Framework Targets Linux Cloud Environments </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Georgia Healthcare Company ApolloMD Breach Exposes 626,000 Patients and Employee Records</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://therecord.media/georgia-healthcare-company-data-breach-impacts-620000" rel="noopener noreferrer" target="_blank">https://therecord.media/georgia-healthcare-company-data-breach-impacts-620000</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/</a></p><p><a href="https://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/</a></p><p><a href="https://cybersecuritynews.com/ivanti-epmm-0-day-flaw-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-epmm-0-day-flaw-exploited/</a></p><p><a href="https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/voidlink-framework-enables-on-demand-tool-generation/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/voidlink-framework-enables-on-demand-tool-generation/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/</a></p><p><a href="https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/</a></p><p><a href="https://therecord.media/russia-throttles-telegram-pushes-its-own-messaging-app" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-throttles-telegram-pushes-its-own-messaging-app</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Apple Patches Exploited Zero-Day, $2K Spyware Hacks Any Phone, First Malicious Outlook Add-In</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1060: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Crazy Ransomware Gang Abuses Employee Monitoring Tool and SimpleHelp RMM for Persistence </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese-Linked VoidLink AI-Generated Malware Framework Targets Linux Cloud Environments </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Georgia Healthcare Company ApolloMD Breach Exposes 626,000 Patients and Employee Records</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://therecord.media/georgia-healthcare-company-data-breach-impacts-620000" rel="noopener noreferrer" target="_blank">https://therecord.media/georgia-healthcare-company-data-breach-impacts-620000</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/</a></p><p><a href="https://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/</a></p><p><a href="https://cybersecuritynews.com/ivanti-epmm-0-day-flaw-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-epmm-0-day-flaw-exploited/</a></p><p><a href="https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/voidlink-framework-enables-on-demand-tool-generation/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/voidlink-framework-enables-on-demand-tool-generation/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/</a></p><p><a href="https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/</a></p><p><a href="https://therecord.media/russia-throttles-telegram-pushes-its-own-messaging-app" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-throttles-telegram-pushes-its-own-messaging-app</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e0917b1c-3869-4e28-9fe4-8018748ad5b6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 12 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e0917b1c-3869-4e28-9fe4-8018748ad5b6.mp3" length="8288108" type="audio/mpeg"/><itunes:duration>17:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1061</itunes:episode><podcast:episode>1061</podcast:episode></item><item><title>Microsoft Patches 6 Zero-Days, China Hacks Singapore Telecoms, North Korea Deepfake Mac Malware</title><itunes:title>Microsoft Patches 6 Zero-Days, China Hacks Singapore Telecoms, North Korea Deepfake Mac Malware</itunes:title><description><![CDATA[<p>🎙️ Microsoft Patches 6 Zero-Days, China Hacks Singapore Telecoms, North Korea Deepfake Mac Malware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1059: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese Cyberspies UNC3886 Breach All Four Singapore Telecom Operators</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FortiOS Authentication Bypass Vulnerability Allows LDAP Bypass </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SAP Patches Critical Code Injection Flaw in CRM and S/4HANA Rated CVSS 9.9</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/</a></p><p><a href="https://thehackernews.com/2026/02/dprk-operatives-impersonate.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/dprk-operatives-impersonate.html</a></p><p><a href="https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-adobe-fixes-44-vulnerabilities-in-creative-apps/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-adobe-fixes-44-vulnerabilities-in-creative-apps/</a></p><p><a href="https://cybersecuritynews.com/fortisandbox-xss-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortisandbox-xss-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html</a></p><p><a href="https://cybersecuritynews.com/fortios-ldap-authentication-bypass-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortios-ldap-authentication-bypass-vulnerability/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-crm-s-4hana-netweaver-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-crm-s-4hana-netweaver-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/</a></p><p><a href="https://www.securityweek.com/rats-in-the-machine-inside-a-pakistan-linked-three-pronged-cyber-assault-on-india/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rats-in-the-machine-inside-a-pakistan-linked-three-pronged-cyber-assault-on-india/</a></p><p><a href="https://therecord.media/cyber-command-nsa-nominee-rudd-advances-to-senate" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-nominee-rudd-advances-to-senate</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Microsoft Patches 6 Zero-Days, China Hacks Singapore Telecoms, North Korea Deepfake Mac Malware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1059: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese Cyberspies UNC3886 Breach All Four Singapore Telecom Operators</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FortiOS Authentication Bypass Vulnerability Allows LDAP Bypass </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SAP Patches Critical Code Injection Flaw in CRM and S/4HANA Rated CVSS 9.9</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/</a></p><p><a href="https://thehackernews.com/2026/02/dprk-operatives-impersonate.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/dprk-operatives-impersonate.html</a></p><p><a href="https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-adobe-fixes-44-vulnerabilities-in-creative-apps/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-adobe-fixes-44-vulnerabilities-in-creative-apps/</a></p><p><a href="https://cybersecuritynews.com/fortisandbox-xss-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortisandbox-xss-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html</a></p><p><a href="https://cybersecuritynews.com/fortios-ldap-authentication-bypass-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortios-ldap-authentication-bypass-vulnerability/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-crm-s-4hana-netweaver-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-crm-s-4hana-netweaver-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/</a></p><p><a href="https://www.securityweek.com/rats-in-the-machine-inside-a-pakistan-linked-three-pronged-cyber-assault-on-india/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rats-in-the-machine-inside-a-pakistan-linked-three-pronged-cyber-assault-on-india/</a></p><p><a href="https://therecord.media/cyber-command-nsa-nominee-rudd-advances-to-senate" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-nominee-rudd-advances-to-senate</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c50e7814-702e-4b7a-adbb-f9afa745fc7b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 11 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c50e7814-702e-4b7a-adbb-f9afa745fc7b.mp3" length="8560556" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1060</itunes:episode><podcast:episode>1060</podcast:episode></item><item><title>SmarterTools Hacked By Own Software, Ivanti Zero-Days Hit EU, China Rehearses Cyber Attacks</title><itunes:title>SmarterTools Hacked By Own Software, Ivanti Zero-Days Hit EU, China Rehearses Cyber Attacks</itunes:title><description><![CDATA[<p>🎙️ SmarterTools Hacked By Own Software, Ivanti Zero-Days Hit EU, China Rehearses Cyber Attacks</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1058: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat Actors Exploit SolarWinds Web Help Desk Flaws to Deploy Velociraptor for C2 </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>BeyondTrust Warns of Critical 9.9 Pre-Auth RCE Flaw in Remote Support Software </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Claude Desktop Extensions Zero-Click RCE Vulnerability Exposes 10,000+ Users</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/</a></p><p><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days</a></p><p><a href="https://cybersecuritynews.com/ivanti-epmm-devices-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-epmm-devices-exploited/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/</a></p><p><a href="https://cybersecuritynews.com/claude-desktop-extensions-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-desktop-extensions-0-click-vulnerability/</a></p><p><a href="https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors" rel="noopener noreferrer" target="_blank">https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors</a></p><p><a href="https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html</a></p><p><a href="https://cybersecuritynews.com/discord-age-restrict-user-access/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/discord-age-restrict-user-access/</a></p><p><a href="https://www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ SmarterTools Hacked By Own Software, Ivanti Zero-Days Hit EU, China Rehearses Cyber Attacks</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1058: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat Actors Exploit SolarWinds Web Help Desk Flaws to Deploy Velociraptor for C2 </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>BeyondTrust Warns of Critical 9.9 Pre-Auth RCE Flaw in Remote Support Software </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Claude Desktop Extensions Zero-Click RCE Vulnerability Exposes 10,000+ Users</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/</a></p><p><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days</a></p><p><a href="https://cybersecuritynews.com/ivanti-epmm-devices-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-epmm-devices-exploited/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/</a></p><p><a href="https://cybersecuritynews.com/claude-desktop-extensions-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/claude-desktop-extensions-0-click-vulnerability/</a></p><p><a href="https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors" rel="noopener noreferrer" target="_blank">https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors</a></p><p><a href="https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html</a></p><p><a href="https://cybersecuritynews.com/discord-age-restrict-user-access/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/discord-age-restrict-user-access/</a></p><p><a href="https://www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">09ade2c2-a3aa-49dd-9e11-be57773e3b87</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 10 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/09ade2c2-a3aa-49dd-9e11-be57773e3b87.mp3" length="7803884" type="audio/mpeg"/><itunes:duration>16:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1059</itunes:episode><podcast:episode>1059</podcast:episode></item><item><title>BridgePay Ransomware Attack Outage, Spain Ministry of Science Breach, State Actor Targets 155 Countries</title><itunes:title>BridgePay Ransomware Attack Outage, Spain Ministry of Science Breach, State Actor Targets 155 Countries</itunes:title><description><![CDATA[<p>🎙️ BridgePay Ransomware Attack Outage, Spain Ministry of Science Breach, State Actor Targets 155 Countries</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1057: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Flickr Security Incident Tied to Third-Party Email System</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DKnife Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Claude Opus 4.6 Finds 500 High Severity Vulnerabilities in Code Analysis</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/</a></p><p><a href="https://www.securityweek.com/flickr-security-incident-tied-to-third-party-email-system/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/flickr-security-incident-tied-to-third-party-email-system/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/</a></p><p><a href="https://www.securityweek.com/dknife-implant-used-by-chinese-threat-actor-for-adversary-in-the-middle-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dknife-implant-used-by-chinese-threat-actor-for-adversary-in-the-middle-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/</a></p><p><a href="https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html</a></p><p><a href="https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/</a></p><p><a href="https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html</a></p><p><a href="https://www.securityweek.com/organizations-urged-to-replace-discontinued-edge-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-urged-to-replace-discontinued-edge-devices/</a></p><p><a href="https://www.securityweek.com/5-bills-to-boost-energy-sector-cyber-defenses-clear-house-panel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/5-bills-to-boost-energy-sector-cyber-defenses-clear-house-panel/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ BridgePay Ransomware Attack Outage, Spain Ministry of Science Breach, State Actor Targets 155 Countries</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1057: Today's episode will discuss the latest news:       </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Flickr Security Incident Tied to Third-Party Email System</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DKnife Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Claude Opus 4.6 Finds 500 High Severity Vulnerabilities in Code Analysis</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/</a></p><p><a href="https://www.securityweek.com/flickr-security-incident-tied-to-third-party-email-system/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/flickr-security-incident-tied-to-third-party-email-system/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/</a></p><p><a href="https://www.securityweek.com/dknife-implant-used-by-chinese-threat-actor-for-adversary-in-the-middle-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dknife-implant-used-by-chinese-threat-actor-for-adversary-in-the-middle-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/</a></p><p><a href="https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html</a></p><p><a href="https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/</a></p><p><a href="https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html</a></p><p><a href="https://www.securityweek.com/organizations-urged-to-replace-discontinued-edge-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-urged-to-replace-discontinued-edge-devices/</a></p><p><a href="https://www.securityweek.com/5-bills-to-boost-energy-sector-cyber-defenses-clear-house-panel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/5-bills-to-boost-energy-sector-cyber-defenses-clear-house-panel/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d7536570-16ac-4a59-b0c4-a50cb6969505</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 09 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d7536570-16ac-4a59-b0c4-a50cb6969505.mp3" length="7767212" type="audio/mpeg"/><itunes:duration>16:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1058</itunes:episode><podcast:episode>1058</podcast:episode></item><item><title>Locked Up: Lessons from the Ransomware Frontline with Zach Lewis</title><itunes:title>Locked Up: Lessons from the Ransomware Frontline with Zach Lewis</itunes:title><description><![CDATA[<p>In this gripping interview, <strong>James Azar</strong> sits down with <strong>Zach Lewis</strong>, CIO and CISO at the <strong>University of Health Sciences and Pharmacy in St. Louis</strong> and author of <em>Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response</em>. Together, they unpack the <em>lived chaos</em> of a ransomware attack — not as theory, but as a raw, human, boots-on-the-ground experience.</p><p>Buy Here: https://amzn.to/4rxvVYT</p><p>Azar calls Lewis’s book <em>“a lived crisis narrative, not a sanitized playbook,”</em> walking readers through the confusion, escalation, leadership pressure, and recovery that define real-world incidents. The two discuss the <em>psychological weight</em> of cyber defense, the stigma surrounding ransomware victims, and the hard truths about recovery that extend far beyond system restoration.</p><p>Lewis shares how his team’s assumptions crumbled under the pressure of the attack — from losing access to the very password manager needed to recover backups, to managing legal negotiations and executive expectations with incomplete information. His honesty about the emotional toll of incident response and the shame many practitioners feel in admitting a breach sets this conversation apart.</p><p>“We have to be right 100% of the time,” Lewis says, “and one false step can lead to something like this.”</p><p>Azar and Lewis explore the <em>human element</em> of cyber warfare — how shame, burnout, and fear still prevent leaders from talking openly about breaches, and why that culture needs to change. Lewis argues that these scars should be worn proudly, not hidden:</p><p>“When veterans talk about the battles they fought, it’s experience. We should be proud of the battles we’ve survived in cyber, too.”</p><p>From negotiating with threat actors to balancing transparency with uncertainty in boardrooms, this episode dives deep into what really happens when theory meets reality. Both leaders emphasize the importance of <strong>relationships</strong>, <strong>data governance</strong>, and <strong>identity management</strong> as core survival tools in today’s threat landscape.</p><p>As Lewis puts it bluntly, “The fact that it happened — that’s the lesson that still sticks. It was avoidable, and that’s hard to live with. But if I had to learn it, this was the way.”</p><p><strong>Key Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Ransomware is inevitable — shame shouldn’t be.</strong> Transparency and shared experience are vital for industry growth.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Emotions matter.</strong> The human toll — burnout, fear, and self-blame — deserves as much attention as the technical aftermath.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Preparation isn’t perfection.</strong> Even the best tabletop exercise misses something. Incident response must evolve dynamically.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Data governance and IAM are the next battlegrounds.</strong> Knowing your data — and who touches it — defines resilience.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Leadership and relationships trump controls.</strong> A CISO’s ability to communicate under fire often determines recovery success.</li></ol><br/><p><strong>James Azar’s Take</strong></p><p>“This episode reminded me why I love talking to practitioners like Zach — people who don’t just theorize security but live it. His honesty about the chaos, the human emotion, and the recovery process is what our industry needs more of. We don’t learn resilience by reading sanitized playbooks — we learn it by surviving the mess together.”</p><p>🎧 <em>Listen now on YouTube, Spotify, or wherever you get your podcasts.</em></p><p> #CyberSecurity #Ransomware #CISO #JamesAzar #ZachLewis #CyberHubPodcast #IncidentResponse #Leadership #Resilience #DataGovernance #CyberResilience #CISOtalk</p>]]></description><content:encoded><![CDATA[<p>In this gripping interview, <strong>James Azar</strong> sits down with <strong>Zach Lewis</strong>, CIO and CISO at the <strong>University of Health Sciences and Pharmacy in St. Louis</strong> and author of <em>Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response</em>. Together, they unpack the <em>lived chaos</em> of a ransomware attack — not as theory, but as a raw, human, boots-on-the-ground experience.</p><p>Buy Here: https://amzn.to/4rxvVYT</p><p>Azar calls Lewis’s book <em>“a lived crisis narrative, not a sanitized playbook,”</em> walking readers through the confusion, escalation, leadership pressure, and recovery that define real-world incidents. The two discuss the <em>psychological weight</em> of cyber defense, the stigma surrounding ransomware victims, and the hard truths about recovery that extend far beyond system restoration.</p><p>Lewis shares how his team’s assumptions crumbled under the pressure of the attack — from losing access to the very password manager needed to recover backups, to managing legal negotiations and executive expectations with incomplete information. His honesty about the emotional toll of incident response and the shame many practitioners feel in admitting a breach sets this conversation apart.</p><p>“We have to be right 100% of the time,” Lewis says, “and one false step can lead to something like this.”</p><p>Azar and Lewis explore the <em>human element</em> of cyber warfare — how shame, burnout, and fear still prevent leaders from talking openly about breaches, and why that culture needs to change. Lewis argues that these scars should be worn proudly, not hidden:</p><p>“When veterans talk about the battles they fought, it’s experience. We should be proud of the battles we’ve survived in cyber, too.”</p><p>From negotiating with threat actors to balancing transparency with uncertainty in boardrooms, this episode dives deep into what really happens when theory meets reality. Both leaders emphasize the importance of <strong>relationships</strong>, <strong>data governance</strong>, and <strong>identity management</strong> as core survival tools in today’s threat landscape.</p><p>As Lewis puts it bluntly, “The fact that it happened — that’s the lesson that still sticks. It was avoidable, and that’s hard to live with. But if I had to learn it, this was the way.”</p><p><strong>Key Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Ransomware is inevitable — shame shouldn’t be.</strong> Transparency and shared experience are vital for industry growth.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Emotions matter.</strong> The human toll — burnout, fear, and self-blame — deserves as much attention as the technical aftermath.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Preparation isn’t perfection.</strong> Even the best tabletop exercise misses something. Incident response must evolve dynamically.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Data governance and IAM are the next battlegrounds.</strong> Knowing your data — and who touches it — defines resilience.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><strong>Leadership and relationships trump controls.</strong> A CISO’s ability to communicate under fire often determines recovery success.</li></ol><br/><p><strong>James Azar’s Take</strong></p><p>“This episode reminded me why I love talking to practitioners like Zach — people who don’t just theorize security but live it. His honesty about the chaos, the human emotion, and the recovery process is what our industry needs more of. We don’t learn resilience by reading sanitized playbooks — we learn it by surviving the mess together.”</p><p>🎧 <em>Listen now on YouTube, Spotify, or wherever you get your podcasts.</em></p><p> #CyberSecurity #Ransomware #CISO #JamesAzar #ZachLewis #CyberHubPodcast #IncidentResponse #Leadership #Resilience #DataGovernance #CyberResilience #CISOtalk</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">daae1cf5-f67d-4fc3-b619-6dfa7418f523</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Sat, 07 Feb 2026 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/daae1cf5-f67d-4fc3-b619-6dfa7418f523.mp3" length="20498156" type="audio/mpeg"/><itunes:duration>42:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1057</itunes:episode><podcast:episode>1057</podcast:episode></item><item><title>Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware</title><itunes:title>Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware</itunes:title><description><![CDATA[<p>🎙️ Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1056: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical N8N Flaws Disclosed Along with Public Exploits </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hackers Compromise Nginx Servers to Redirect User Traffic</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://thecyberexpress.com/lakelands-public-health-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/lakelands-public-health-cyberattack/</a></p><p><a href="https://www.bankinfosecurity.com/harvard-upenn-data-leaked-in-shinyhunters-shakedown-a-30677" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/harvard-upenn-data-leaked-in-shinyhunters-shakedown-a-30677</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/</a></p><p><a href="https://cybersecuritynews.com/vmware-esxi-0-day-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/vmware-esxi-0-day-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-allowed-full-compromise-of-google-looker-instances/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-allowed-full-compromise-of-google-looker-instances/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/</a></p><p><a href="https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html</a></p><p><a href="https://www.securityweek.com/varonis-acquisition-of-alltrue-ai-valued-at-150-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/varonis-acquisition-of-alltrue-ai-valued-at-150-million/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Harvard UPenn Data Leaked ShinyHunters, CISA SolarWinds RCE Exploit, VMware ESXi ZeroDay Ransomware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1056: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical N8N Flaws Disclosed Along with Public Exploits </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hackers Compromise Nginx Servers to Redirect User Traffic</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://thecyberexpress.com/lakelands-public-health-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/lakelands-public-health-cyberattack/</a></p><p><a href="https://www.bankinfosecurity.com/harvard-upenn-data-leaked-in-shinyhunters-shakedown-a-30677" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/harvard-upenn-data-leaked-in-shinyhunters-shakedown-a-30677</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/</a></p><p><a href="https://cybersecuritynews.com/vmware-esxi-0-day-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/vmware-esxi-0-day-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-allowed-full-compromise-of-google-looker-instances/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-allowed-full-compromise-of-google-looker-instances/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/</a></p><p><a href="https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html</a></p><p><a href="https://www.securityweek.com/varonis-acquisition-of-alltrue-ai-valued-at-150-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/varonis-acquisition-of-alltrue-ai-valued-at-150-million/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d332d0c6-71ba-4d8e-ac51-f924c1c567f5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 05 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d332d0c6-71ba-4d8e-ac51-f924c1c567f5.mp3" length="8160428" type="audio/mpeg"/><itunes:duration>17:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1056</itunes:episode><podcast:episode>1056</podcast:episode></item><item><title>Step Finance $40M Crypto Theft Exec Devices Compromised, Iron Mountain Data Breach, React Native Zero-Day</title><itunes:title>Step Finance $40M Crypto Theft Exec Devices Compromised, Iron Mountain Data Breach, React Native Zero-Day</itunes:title><description><![CDATA[<p>🎙️ Step Finance $40M Crypto Theft Exec Devices Compromised, Iron Mountain Data Breach, React Native Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1055: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Sean Cairncross Discusses White House Cybersecurity Strategy at ITI </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud Storage Payment Scam Floods Inboxes with Fake Renewals</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wave of Citrix NetScaler Scans Use Thousands of Residential Proxies</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/sean-cairncross-white-house-cybersecurity-strategy-iti/811255/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sean-cairncross-white-house-cybersecurity-strategy-iti/811255/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/</a></strong></p><p><strong><a href="https://www.securityweek.com/critical-react-native-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-react-native-vulnerability-exploited-in-the-wild/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/infostealer-campaigns-expand/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/infostealer-campaigns-expand/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html</a></strong></p><p><strong><a href="https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Step Finance $40M Crypto Theft Exec Devices Compromised, Iron Mountain Data Breach, React Native Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1055: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Sean Cairncross Discusses White House Cybersecurity Strategy at ITI </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud Storage Payment Scam Floods Inboxes with Fake Renewals</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wave of Citrix NetScaler Scans Use Thousands of Residential Proxies</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/sean-cairncross-white-house-cybersecurity-strategy-iti/811255/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sean-cairncross-white-house-cybersecurity-strategy-iti/811255/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/</a></strong></p><p><strong><a href="https://www.securityweek.com/critical-react-native-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-react-native-vulnerability-exploited-in-the-wild/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/infostealer-campaigns-expand/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/infostealer-campaigns-expand/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html</a></strong></p><p><strong><a href="https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2c6b069c-fcb3-4ebc-a769-4726fa3f06a2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 04 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2c6b069c-fcb3-4ebc-a769-4726fa3f06a2.mp3" length="7250156" type="audio/mpeg"/><itunes:duration>15:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1055</itunes:episode><podcast:episode>1055</podcast:episode></item><item><title>Notepad++ Supply Chain Hack by China, Panera Bread 5.1M Breach, APT28 Exploit Discovered</title><itunes:title>Notepad++ Supply Chain Hack by China, Panera Bread 5.1M Breach, APT28 Exploit Discovered</itunes:title><description><![CDATA[<p>🎙️ Notepad++ Supply Chain Hack by China, Panera Bread 5.1M Breach, APT28 Exploit Discovered</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1054: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DynoWiper Data Wiping Malware Discovered in Active Campaigns </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Researchers Find 341 Malicious ClawHub Packages in Supply Chain Attack  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New Glassworm Attack Targets macOS via Compromised OpenVSX Extensions</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/dynowiper-data-wiping-malware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/dynowiper-data-wiping-malware/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html</a></strong></p><p><strong><a href="https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/russian-hacker-alliance-targeting-denmark/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/russian-hacker-alliance-targeting-denmark/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/fcc-telecommunications-ransomware-warning/811100/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-telecommunications-ransomware-warning/811100/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Notepad++ Supply Chain Hack by China, Panera Bread 5.1M Breach, APT28 Exploit Discovered</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1054: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DynoWiper Data Wiping Malware Discovered in Active Campaigns </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Researchers Find 341 Malicious ClawHub Packages in Supply Chain Attack  </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New Glassworm Attack Targets macOS via Compromised OpenVSX Extensions</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/dynowiper-data-wiping-malware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/dynowiper-data-wiping-malware/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html</a></strong></p><p><strong><a href="https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/russian-hacker-alliance-targeting-denmark/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/russian-hacker-alliance-targeting-denmark/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/fcc-telecommunications-ransomware-warning/811100/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-telecommunications-ransomware-warning/811100/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">52dc76e0-7386-4439-9521-c7f0f936c3dc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 03 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/52dc76e0-7386-4439-9521-c7f0f936c3dc.mp3" length="7846316" type="audio/mpeg"/><itunes:duration>16:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1054</itunes:episode><podcast:episode>1054</podcast:episode></item><item><title>Bumble Match Dating Apps Data Breaches, Marquis Blames SonicWall Cloud Backup, Crypto $158B Illicit Funds</title><itunes:title>Bumble Match Dating Apps Data Breaches, Marquis Blames SonicWall Cloud Backup, Crypto $158B Illicit Funds</itunes:title><description><![CDATA[<p>🎙️ Bumble Match Dating Apps Data Breaches, Marquis Blames SonicWall Cloud Backup, Crypto $158B Illicit Funds</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Andy’s GoFundMe: https://gofund.me/31de09e7f</p><p>Ep – 1053: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MoltBook AI Vulnerability Discovered in Platform </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Coupang Acting CEO Questioned as Police Investigate Data Breach </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ICS Devices Bricked in Russia-Linked Strike on Polish Power Grid</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://cybersecuritynews.com/moltbook-ai-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/moltbook-ai-vulnerability/</a></strong></p><p><strong><a href="https://therecord.media/bumble-match-dating-apps-data-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/bumble-match-dating-apps-data-breaches</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/</a></strong></p><p><strong><a href="https://therecord.media/coupang-acting-CEO-questioned-police-investigating-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/coupang-acting-CEO-questioned-police-investigating-data-breach</a></strong></p><p><strong><a href="https://www.securityweek.com/ics-devices-bricked-in-russia-linked-strike-on-polish-power-grid/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-devices-bricked-in-russia-linked-strike-on-polish-power-grid/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/</a></strong></p><p><strong><a href="https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/exposed-mongodb-instances-still-targeted-in-data-extortion-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/exposed-mongodb-instances-still-targeted-in-data-extortion-attacks/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/johnson-controls-products-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/johnson-controls-products-vulnerabilities/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Bumble Match Dating Apps Data Breaches, Marquis Blames SonicWall Cloud Backup, Crypto $158B Illicit Funds</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Andy’s GoFundMe: https://gofund.me/31de09e7f</p><p>Ep – 1053: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>MoltBook AI Vulnerability Discovered in Platform </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Coupang Acting CEO Questioned as Police Investigate Data Breach </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ICS Devices Bricked in Russia-Linked Strike on Polish Power Grid</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://cybersecuritynews.com/moltbook-ai-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/moltbook-ai-vulnerability/</a></strong></p><p><strong><a href="https://therecord.media/bumble-match-dating-apps-data-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/bumble-match-dating-apps-data-breaches</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/</a></strong></p><p><strong><a href="https://therecord.media/coupang-acting-CEO-questioned-police-investigating-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/coupang-acting-CEO-questioned-police-investigating-data-breach</a></strong></p><p><strong><a href="https://www.securityweek.com/ics-devices-bricked-in-russia-linked-strike-on-polish-power-grid/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-devices-bricked-in-russia-linked-strike-on-polish-power-grid/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/</a></strong></p><p><strong><a href="https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-exploited-epmm-zero-days/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/exposed-mongodb-instances-still-targeted-in-data-extortion-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/exposed-mongodb-instances-still-targeted-in-data-extortion-attacks/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/johnson-controls-products-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/johnson-controls-products-vulnerabilities/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">458769eb-c840-4193-b8ae-d8d7476f1a49</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 02 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/458769eb-c840-4193-b8ae-d8d7476f1a49.mp3" length="8221676" type="audio/mpeg"/><itunes:duration>17:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1053</itunes:episode><podcast:episode>1053</podcast:episode></item><item><title>Poland Grid Cyberattack 30 Facilities, eScan Breached Malicious Update, FBI Seizes RAMP Cybercrime Forum</title><itunes:title>Poland Grid Cyberattack 30 Facilities, eScan Breached Malicious Update, FBI Seizes RAMP Cybercrime Forum</itunes:title><description><![CDATA[<p>🎙️ Poland Grid Cyberattack 30 Facilities, eScan Breached Malicious Update, FBI Seizes RAMP Cybercrime Forum</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Andy’s GoFundMe: https://gofund.me/31de09e7f</p><p>Ep – 1052: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>eScan Confirms Update Server Breached to Push Malicious Update </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercom 2.0: Cyber Force Generation and China Living Off The Land </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UK Government Warned of Cyber Hybrid Threats and Offensive Operations</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/</a></strong></p><p><strong><a href="https://defensescoop.com/2026/01/28/cybercom-2-0-cyber-force-generation-china-living-off-the-land/" rel="noopener noreferrer" target="_blank">https://defensescoop.com/2026/01/28/cybercom-2-0-cyber-force-generation-china-living-off-the-land/</a></strong></p><p><strong><a href="https://therecord.media/uk-government-warned-cyber-hybrid-threats-offensive-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-warned-cyber-hybrid-threats-offensive-operations</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/</a></strong></p><p><strong><a href="https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/gemini-mcp-tool-0-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/gemini-mcp-tool-0-day-vulnerability/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/tp-link-archer-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/tp-link-archer-vulnerability/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Poland Grid Cyberattack 30 Facilities, eScan Breached Malicious Update, FBI Seizes RAMP Cybercrime Forum</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Andy’s GoFundMe: https://gofund.me/31de09e7f</p><p>Ep – 1052: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>eScan Confirms Update Server Breached to Push Malicious Update </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercom 2.0: Cyber Force Generation and China Living Off The Land </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>UK Government Warned of Cyber Hybrid Threats and Offensive Operations</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/</a></strong></p><p><strong><a href="https://defensescoop.com/2026/01/28/cybercom-2-0-cyber-force-generation-china-living-off-the-land/" rel="noopener noreferrer" target="_blank">https://defensescoop.com/2026/01/28/cybercom-2-0-cyber-force-generation-china-living-off-the-land/</a></strong></p><p><strong><a href="https://therecord.media/uk-government-warned-cyber-hybrid-threats-offensive-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-warned-cyber-hybrid-threats-offensive-operations</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/</a></strong></p><p><strong><a href="https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/gemini-mcp-tool-0-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/gemini-mcp-tool-0-day-vulnerability/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/tp-link-archer-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/tp-link-archer-vulnerability/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/</a></strong></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7b63db06-b200-49e4-b773-323e8dc9562c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 29 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7b63db06-b200-49e4-b773-323e8dc9562c.mp3" length="7840556" type="audio/mpeg"/><itunes:duration>16:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1052</itunes:episode><podcast:episode>1052</podcast:episode></item><item><title>ShinyHunters 100+ Orgs Phishing Campaign, Russia Delta Security Cyberattack, 800K Telnet Servers Exposed</title><itunes:title>ShinyHunters 100+ Orgs Phishing Campaign, Russia Delta Security Cyberattack, 800K Telnet Servers Exposed</itunes:title><description><![CDATA[<p>🎙️ ShinyHunters 100+ Orgs Phishing Campaign, Russia Delta Security Cyberattack, 800K Telnet Servers Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Andy’s Go FundMe: https://gofund.me/31de09e7f</p><p>Ep – 1051: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Nearly 800,000 Telnet Servers Exposed to Remote Attacks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fortinet Blocks Exploited FortiCloud SSO Zero-Day Until Patch is Ready</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Attackers Hijacking Official GitHub Desktop Repository</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/over-100-organizations-targeted-in-shinyhunters-phishing-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-100-organizations-targeted-in-shinyhunters-phishing-campaign/</a></strong></p><p><strong><a href="https://therecord.media/russia-delta-security-alarm-company-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-delta-security-alarm-company-cyberattack</a></strong></p><p><strong><a href="https://www.securityweek.com/chrome-edge-extensions-caught-stealing-chatgpt-sessions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-edge-extensions-caught-stealing-chatgpt-sessions/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/attackers-hijacking-official-github-desktop-repository/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/attackers-hijacking-official-github-desktop-repository/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/chinese-mustang-panda-hackers-deploy-infostealers-via-coolclient-backdoor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-mustang-panda-hackers-deploy-infostealers-via-coolclient-backdoor/</a></strong></p><p><strong><a href="https://therecord.media/chinese-money-launderers-moved-more-crypto-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-money-launderers-moved-more-crypto-2025</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/us-charges-31-more-suspects-linked-to-atm-malware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-31-more-suspects-linked-to-atm-malware-attacks/</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a></p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a></p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a></p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a></p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a></p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a></p><p><br></p><p><strong>🤝 For Business Inquiries:</strong> <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching:</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ ShinyHunters 100+ Orgs Phishing Campaign, Russia Delta Security Cyberattack, 800K Telnet Servers Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Andy’s Go FundMe: https://gofund.me/31de09e7f</p><p>Ep – 1051: Today's episode will discuss the latest news:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Nearly 800,000 Telnet Servers Exposed to Remote Attacks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Fortinet Blocks Exploited FortiCloud SSO Zero-Day Until Patch is Ready</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Attackers Hijacking Official GitHub Desktop Repository</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/over-100-organizations-targeted-in-shinyhunters-phishing-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-100-organizations-targeted-in-shinyhunters-phishing-campaign/</a></strong></p><p><strong><a href="https://therecord.media/russia-delta-security-alarm-company-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-delta-security-alarm-company-cyberattack</a></strong></p><p><strong><a href="https://www.securityweek.com/chrome-edge-extensions-caught-stealing-chatgpt-sessions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-edge-extensions-caught-stealing-chatgpt-sessions/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/attackers-hijacking-official-github-desktop-repository/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/attackers-hijacking-official-github-desktop-repository/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/chinese-mustang-panda-hackers-deploy-infostealers-via-coolclient-backdoor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-mustang-panda-hackers-deploy-infostealers-via-coolclient-backdoor/</a></strong></p><p><strong><a href="https://therecord.media/chinese-money-launderers-moved-more-crypto-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-money-launderers-moved-more-crypto-2025</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/us-charges-31-more-suspects-linked-to-atm-malware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-31-more-suspects-linked-to-atm-malware-attacks/</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a></p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a></p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a></p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a></p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a></p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a></p><p><br></p><p><strong>🤝 For Business Inquiries:</strong> <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching:</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9555c4ba-7197-41e3-971c-ce64e6ec070d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 28 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/9555c4ba-7197-41e3-971c-ce64e6ec070d.mp3" length="7865900" type="audio/mpeg"/><itunes:duration>16:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1051</itunes:episode><podcast:episode>1051</podcast:episode></item><item><title>China Hacked Downing Street Phones for Years, Nova Ransomware KPMG Netherlands, Microsoft Office Zero-Day</title><itunes:title>China Hacked Downing Street Phones for Years, Nova Ransomware KPMG Netherlands, Microsoft Office Zero-Day</itunes:title><description><![CDATA[<p>🎙️ China Hacked Downing Street Phones for Years, Nova Ransomware KPMG Netherlands, Microsoft Office Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1050: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New ClickFix Attacks Abuse Windows App-V Scripts to Push Malware </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New Malware Service Guarantees Phishing Extensions on Chrome Web Store </li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/cybercrime-group-voice-phishing-attacks-Okta/810493/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cybercrime-group-voice-phishing-attacks-Okta/810493/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/</a></strong></p><p><strong><a href="https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html</a></strong></p><p><strong><a href="https://therecord.media/google-settles-millions-privacy-recording" rel="noopener noreferrer" target="_blank">https://therecord.media/google-settles-millions-privacy-recording</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China Hacked Downing Street Phones for Years, Nova Ransomware KPMG Netherlands, Microsoft Office Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1050: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New ClickFix Attacks Abuse Windows App-V Scripts to Push Malware </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New Malware Service Guarantees Phishing Extensions on Chrome Web Store </li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/</a></strong></p><p><strong><a href="https://www.cybersecuritydive.com/news/cybercrime-group-voice-phishing-attacks-Okta/810493/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cybercrime-group-voice-phishing-attacks-Okta/810493/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/</a></strong></p><p><strong><a href="https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html</a></strong></p><p><strong><a href="https://therecord.media/google-settles-millions-privacy-recording" rel="noopener noreferrer" target="_blank">https://therecord.media/google-settles-millions-privacy-recording</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">840ff009-89bb-4bf9-bd63-675f6195594d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 27 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/840ff009-89bb-4bf9-bd63-675f6195594d.mp3" length="7523756" type="audio/mpeg"/><itunes:duration>15:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1050</itunes:episode><podcast:episode>1050</podcast:episode></item><item><title>Crunchbase Data Breach Confirmed, Nike Probes Hack, Fortinet FortiCloud Not Fully Patched</title><itunes:title>Crunchbase Data Breach Confirmed, Nike Probes Hack, Fortinet FortiCloud Not Fully Patched</itunes:title><description><![CDATA[<p>🎙️ Crunchbase Data Breach Confirmed, Nike Probes Hack, Fortinet FortiCloud Not Fully Patched</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1049: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dresden State Art Collections Hit by Cyberattack </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Claim to Be Behind SSO Account Data Theft Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/crunchbase-confirms-data-breach-after-hacking-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crunchbase-confirms-data-breach-after-hacking-claims/</a></strong></p><p><strong><a href="https://www.securityweek.com/nike-probing-potential-security-incident-as-hackers-threaten-to-leak-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nike-probing-potential-security-incident-as-hackers-threaten-to-leak-data/</a></strong></p><p><strong><a href="https://therecord.media/dresden-state-art-collections-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/dresden-state-art-collections-cyberattack</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/</a></strong></p><p><strong><a href="https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/</a></strong></p><p><strong><a href="https://therecord.media/china-investigates-top-general-purge-senior-military-leaders" rel="noopener noreferrer" target="_blank">https://therecord.media/china-investigates-top-general-purge-senior-military-leaders</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/lazarus-hackers-actively-attacking-european-drone/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lazarus-hackers-actively-attacking-european-drone/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Crunchbase Data Breach Confirmed, Nike Probes Hack, Fortinet FortiCloud Not Fully Patched</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1049: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dresden State Art Collections Hit by Cyberattack </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ShinyHunters Claim to Be Behind SSO Account Data Theft Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://www.securityweek.com/crunchbase-confirms-data-breach-after-hacking-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crunchbase-confirms-data-breach-after-hacking-claims/</a></strong></p><p><strong><a href="https://www.securityweek.com/nike-probing-potential-security-incident-as-hackers-threaten-to-leak-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nike-probing-potential-security-incident-as-hackers-threaten-to-leak-data/</a></strong></p><p><strong><a href="https://therecord.media/dresden-state-art-collections-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/dresden-state-art-collections-cyberattack</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/</a></strong></p><p><strong><a href="https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/</a></strong></p><p><strong><a href="https://therecord.media/china-investigates-top-general-purge-senior-military-leaders" rel="noopener noreferrer" target="_blank">https://therecord.media/china-investigates-top-general-purge-senior-military-leaders</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/</a></strong></p><p><strong><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/</a></strong></p><p><strong><a href="https://cybersecuritynews.com/lazarus-hackers-actively-attacking-european-drone/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lazarus-hackers-actively-attacking-european-drone/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">aa2b8cf0-d700-483e-8d21-a84094dc8415</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 26 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/aa2b8cf0-d700-483e-8d21-a84094dc8415.mp3" length="7706156" type="audio/mpeg"/><itunes:duration>16:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1049</itunes:episode><podcast:episode>1049</podcast:episode></item><item><title>Manufacturing Giant Luxshare Data Leak, Database Mega-Patch, Already Patched Firewall Exploited</title><itunes:title>Manufacturing Giant Luxshare Data Leak, Database Mega-Patch, Already Patched Firewall Exploited</itunes:title><description><![CDATA[<p>🎙️ Manufacturing Giant Luxshare Data Leak, Database Mega-Patch, Already Patched Firewall Exploited</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1048: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>LastPass Users Targeted with Backup-Themed Phishing Emails </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Enterprise Communications CVE-2026-20045 Vulnerability Disclosed </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>North Korean Hackers Target macOS Developers via Malicious VS Code Projects</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://cybersecuritynews.com/luxshare-data-exposed/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/luxshare-data-exposed/</a></strong></p><p><strong><a href="https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html</a></strong></p><p><strong><a href="https://www.helpnetsecurity.com/2026/01/21/patched-fortigate-compromised-via-cve-2025-59718/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2026/01/21/patched-fortigate-compromised-via-cve-2025-59718/</a></strong></p><p><strong><a href="https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/</a></strong></p><p><strong><a href="https://www.helpnetsecurity.com/2026/01/21/cisco-enterprise-communications-cve-2026-20045/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2026/01/21/cisco-enterprise-communications-cve-2026-20045/</a></strong></p><p><strong><a href="https://www.securityweek.com/north-korean-hackers-target-macos-developers-via-malicious-vs-code-projects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-target-macos-developers-via-malicious-vs-code-projects/</a></strong></p><p><strong><a href="https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers" rel="noopener noreferrer" target="_blank">https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers</a></strong></p><p><strong><a href="https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Manufacturing Giant Luxshare Data Leak, Database Mega-Patch, Already Patched Firewall Exploited</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1048: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>LastPass Users Targeted with Backup-Themed Phishing Emails </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Enterprise Communications CVE-2026-20045 Vulnerability Disclosed </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>North Korean Hackers Target macOS Developers via Malicious VS Code Projects</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><strong><a href="https://cybersecuritynews.com/luxshare-data-exposed/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/luxshare-data-exposed/</a></strong></p><p><strong><a href="https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/</a></strong></p><p><strong><a href="https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html</a></strong></p><p><strong><a href="https://www.helpnetsecurity.com/2026/01/21/patched-fortigate-compromised-via-cve-2025-59718/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2026/01/21/patched-fortigate-compromised-via-cve-2025-59718/</a></strong></p><p><strong><a href="https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/</a></strong></p><p><strong><a href="https://www.helpnetsecurity.com/2026/01/21/cisco-enterprise-communications-cve-2026-20045/" rel="noopener noreferrer" target="_blank">https://www.helpnetsecurity.com/2026/01/21/cisco-enterprise-communications-cve-2026-20045/</a></strong></p><p><strong><a href="https://www.securityweek.com/north-korean-hackers-target-macos-developers-via-malicious-vs-code-projects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-target-macos-developers-via-malicious-vs-code-projects/</a></strong></p><p><strong><a href="https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers" rel="noopener noreferrer" target="_blank">https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers</a></strong></p><p><strong><a href="https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/</a></strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1caa3ccd-e74e-4e26-b296-dffd7a546327</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 22 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1caa3ccd-e74e-4e26-b296-dffd7a546327.mp3" length="8137772" type="audio/mpeg"/><itunes:duration>16:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1048</itunes:episode><podcast:episode>1048</podcast:episode></item><item><title>McDonald&apos;s India Everest Ransomware Attack, EU Plans China Telecom Phase Out, NK Hackers Target Workers</title><itunes:title>McDonald&apos;s India Everest Ransomware Attack, EU Plans China Telecom Phase Out, NK Hackers Target Workers</itunes:title><description><![CDATA[<p>🎙️ McDonald's India Everest Ransomware Attack, EU Plans China Telecom Phase Out, NK Hackers Target Workers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1047: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Weaponized Invite Enabled Calendar Data Theft via Google Gemini </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Three Flaws in Anthropic MCP Git Server Discovered </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ransomware and Supply Chain Attacks Set Record in 2025</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><u><a href="https://cybersecuritynews.com/mcdonalds-india-everest-ransomware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/mcdonalds-india-everest-ransomware/</a></u></p><p><u><a href="https://www.securityweek.com/eu-plans-phase-out-of-high-risk-telecom-suppliers-in-proposals-seen-as-targeting-china/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/eu-plans-phase-out-of-high-risk-telecom-suppliers-in-proposals-seen-as-targeting-china/</a></u></p><p><u><a href="https://therecord.media/hackers-target-afghan-workers" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-target-afghan-workers</a></u></p><p><u><a href="https://www.abc.net.au/news/2026-01-20/security-concerns-over-chinese-electric-buses-transport-canberra/106250794" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2026-01-20/security-concerns-over-chinese-electric-buses-transport-canberra/106250794</a></u></p><p><u><a href="https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html</a></u></p><p><u><a href="https://www.securityweek.com/weaponized-invite-enabled-calendar-data-theft-via-google-gemini/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/weaponized-invite-enabled-calendar-data-theft-via-google-gemini/</a></u></p><p><u><a href="https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html</a></u></p><p><u><a href="https://thecyberexpress.com/ransomware-and-supply-chain-attacks-set-record/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ransomware-and-supply-chain-attacks-set-record/</a></u></p><p><u><a href="https://thecyberexpress.com/cyble-2025-threat-landscape-ransomware-report/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cyble-2025-threat-landscape-ransomware-report/</a></u></p><p><u><a href="https://therecord.media/supreme-court-geofence-constitutionality" rel="noopener noreferrer" target="_blank">https://therecord.media/supreme-court-geofence-constitutionality</a></u></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ McDonald's India Everest Ransomware Attack, EU Plans China Telecom Phase Out, NK Hackers Target Workers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1047: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Weaponized Invite Enabled Calendar Data Theft via Google Gemini </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Three Flaws in Anthropic MCP Git Server Discovered </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ransomware and Supply Chain Attacks Set Record in 2025</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><u><a href="https://cybersecuritynews.com/mcdonalds-india-everest-ransomware/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/mcdonalds-india-everest-ransomware/</a></u></p><p><u><a href="https://www.securityweek.com/eu-plans-phase-out-of-high-risk-telecom-suppliers-in-proposals-seen-as-targeting-china/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/eu-plans-phase-out-of-high-risk-telecom-suppliers-in-proposals-seen-as-targeting-china/</a></u></p><p><u><a href="https://therecord.media/hackers-target-afghan-workers" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-target-afghan-workers</a></u></p><p><u><a href="https://www.abc.net.au/news/2026-01-20/security-concerns-over-chinese-electric-buses-transport-canberra/106250794" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2026-01-20/security-concerns-over-chinese-electric-buses-transport-canberra/106250794</a></u></p><p><u><a href="https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html</a></u></p><p><u><a href="https://www.securityweek.com/weaponized-invite-enabled-calendar-data-theft-via-google-gemini/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/weaponized-invite-enabled-calendar-data-theft-via-google-gemini/</a></u></p><p><u><a href="https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html</a></u></p><p><u><a href="https://thecyberexpress.com/ransomware-and-supply-chain-attacks-set-record/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ransomware-and-supply-chain-attacks-set-record/</a></u></p><p><u><a href="https://thecyberexpress.com/cyble-2025-threat-landscape-ransomware-report/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cyble-2025-threat-landscape-ransomware-report/</a></u></p><p><u><a href="https://therecord.media/supreme-court-geofence-constitutionality" rel="noopener noreferrer" target="_blank">https://therecord.media/supreme-court-geofence-constitutionality</a></u></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9560eaae-5d70-4e40-9fc1-2decaddc0422</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 21 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/9560eaae-5d70-4e40-9fc1-2decaddc0422.mp3" length="9617708" type="audio/mpeg"/><itunes:duration>20:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1047</itunes:episode><podcast:episode>1047</podcast:episode></item><item><title>Ingram Micro Ransomware 42K Impacted, 4 in 5 Small Businesses Hit by Cyberscams, Jen Easterly RSAC CEO</title><itunes:title>Ingram Micro Ransomware 42K Impacted, 4 in 5 Small Businesses Hit by Cyberscams, Jen Easterly RSAC CEO</itunes:title><description><![CDATA[<p>🎙️ Ingram Micro Ransomware 42K Impacted, 4 in 5 Small Businesses Hit by Cyberscams, Jen Easterly RSAC CEO</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1046: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Germany Cyber Dome Collaboration with Israel Announced </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TP-Link Patches Vulnerability Exposing VIGI Cameras to Hacking </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloudflare Zero-Day Vulnerability Discovered and Patched</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/42000-impacted-by-ingram-micro-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/42000-impacted-by-ingram-micro-ransomware-attack/</a></p><p><a href="https://www.gmtoday.com/business/4-in-5-small-businesses-had-cyberscams-last-year-and-almost-half-of-attacks-were/article_fbba99c1-5fe6-4797-aa73-ed00ff2d7d41.html" rel="noopener noreferrer" target="_blank">https://www.gmtoday.com/business/4-in-5-small-businesses-had-cyberscams-last-year-and-almost-half-of-attacks-were/article_fbba99c1-5fe6-4797-aa73-ed00ff2d7d41.html</a></p><p><a href="https://therecord.media/germany-cyber-dome-israel" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-cyber-dome-israel</a></p><p><a href="https://www.securityweek.com/tp-link-patches-vulnerability-exposing-vigi-cameras-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tp-link-patches-vulnerability-exposing-vigi-cameras-to-hacking/</a></p><p><a href="https://cybersecuritynews.com/cloudflare-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cloudflare-zero-day-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html</a></p><p><a href="https://cybersecuritynews.com/threat-actors-weaponizing-visual-studio-code/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-weaponizing-visual-studio-code/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-impersonate-as-malwarebytes/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-impersonate-as-malwarebytes/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-govt-warns-about-ongoing-russian-hacktivist-group-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-govt-warns-about-ongoing-russian-hacktivist-group-attacks/</a></p><p><a href="https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/</a></p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/bipartisan-bill-pushes-pentagon-to-close-cyber-talent-gaps-hardwire-workforce-strategy-into-national-security/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/regulation-standards-and-compliance/bipartisan-bill-pushes-pentagon-to-close-cyber-talent-gaps-hardwire-workforce-strategy-into-national-security/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Ingram Micro Ransomware 42K Impacted, 4 in 5 Small Businesses Hit by Cyberscams, Jen Easterly RSAC CEO</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1046: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Germany Cyber Dome Collaboration with Israel Announced </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TP-Link Patches Vulnerability Exposing VIGI Cameras to Hacking </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloudflare Zero-Day Vulnerability Discovered and Patched</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.securityweek.com/42000-impacted-by-ingram-micro-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/42000-impacted-by-ingram-micro-ransomware-attack/</a></p><p><a href="https://www.gmtoday.com/business/4-in-5-small-businesses-had-cyberscams-last-year-and-almost-half-of-attacks-were/article_fbba99c1-5fe6-4797-aa73-ed00ff2d7d41.html" rel="noopener noreferrer" target="_blank">https://www.gmtoday.com/business/4-in-5-small-businesses-had-cyberscams-last-year-and-almost-half-of-attacks-were/article_fbba99c1-5fe6-4797-aa73-ed00ff2d7d41.html</a></p><p><a href="https://therecord.media/germany-cyber-dome-israel" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-cyber-dome-israel</a></p><p><a href="https://www.securityweek.com/tp-link-patches-vulnerability-exposing-vigi-cameras-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tp-link-patches-vulnerability-exposing-vigi-cameras-to-hacking/</a></p><p><a href="https://cybersecuritynews.com/cloudflare-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cloudflare-zero-day-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html</a></p><p><a href="https://cybersecuritynews.com/threat-actors-weaponizing-visual-studio-code/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-weaponizing-visual-studio-code/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-impersonate-as-malwarebytes/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-impersonate-as-malwarebytes/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-govt-warns-about-ongoing-russian-hacktivist-group-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-govt-warns-about-ongoing-russian-hacktivist-group-attacks/</a></p><p><a href="https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/</a></p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/bipartisan-bill-pushes-pentagon-to-close-cyber-talent-gaps-hardwire-workforce-strategy-into-national-security/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/regulation-standards-and-compliance/bipartisan-bill-pushes-pentagon-to-close-cyber-talent-gaps-hardwire-workforce-strategy-into-national-security/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e2c3bae8-0d2d-4f70-8932-205358c3b95d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 20 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e2c3bae8-0d2d-4f70-8932-205358c3b95d.mp3" length="7692908" type="audio/mpeg"/><itunes:duration>16:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1046</itunes:episode><podcast:episode>1046</podcast:episode></item><item><title>Cybersecurity Firms React China Software Ban, Iranian State TV Hacked Anti-Regime, Black Basta Police Raids</title><itunes:title>Cybersecurity Firms React China Software Ban, Iranian State TV Hacked Anti-Regime, Black Basta Police Raids</itunes:title><description><![CDATA[<p>🎙️ Cybersecurity Firms React China Software Ban, Iranian State TV Hacked Anti-Regime, Black Basta Police Raids</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1045: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China-Linked Hackers Exploited Sitecore Zero-Day for Initial Access </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Five Malicious Chrome Extensions Discovered Stealing User Data </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>NSA Cyber Command Nominee Joshua Rudd Senate Hearing</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><u><a href="https://www.securityweek.com/cybersecurity-firms-react-to-chinas-reported-software-ban/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-firms-react-to-chinas-reported-software-ban/</a></u></p><p><u><a href="https://www.reuters.com/world/musks-starlink-faces-high-profile-security-test-iran-crackdown-2026-01-16/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/musks-starlink-faces-high-profile-security-test-iran-crackdown-2026-01-16/</a></u></p><p><u><a href="https://israelhayom.com/2026/01/18/iranian-state-tv-hacked-air-anti-regime-messages" rel="noopener noreferrer" target="_blank">https://israelhayom.com/2026/01/18/iranian-state-tv-hacked-air-anti-regime-messages</a></u></p><p><u><a href="https://therecord.media/anchorage-police-takes-servers-offline-after-third-party-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/anchorage-police-takes-servers-offline-after-third-party-attack</a></u></p><p><u><a href="https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/</a></u></p><p><u><a href="https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers" rel="noopener noreferrer" target="_blank">https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers</a></u></p><p><u><a href="https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-sitecore-zero-day-for-initial-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-sitecore-zero-day-for-initial-access/</a></u></p><p><u><a href="https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html</a></u></p><p><u><a href="https://therecord.media/nsa-cyber-command-nom-joshua-rudd-senate-hearing" rel="noopener noreferrer" target="_blank">https://therecord.media/nsa-cyber-command-nom-joshua-rudd-senate-hearing</a></u></p><p><u><a href="https://therecord.media/guilty-plea-initial-access-broker-r1z" rel="noopener noreferrer" target="_blank">https://therecord.media/guilty-plea-initial-access-broker-r1z</a></u></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cybersecurity Firms React China Software Ban, Iranian State TV Hacked Anti-Regime, Black Basta Police Raids</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1045: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China-Linked Hackers Exploited Sitecore Zero-Day for Initial Access </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Five Malicious Chrome Extensions Discovered Stealing User Data </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>NSA Cyber Command Nominee Joshua Rudd Senate Hearing</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><u><a href="https://www.securityweek.com/cybersecurity-firms-react-to-chinas-reported-software-ban/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-firms-react-to-chinas-reported-software-ban/</a></u></p><p><u><a href="https://www.reuters.com/world/musks-starlink-faces-high-profile-security-test-iran-crackdown-2026-01-16/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/musks-starlink-faces-high-profile-security-test-iran-crackdown-2026-01-16/</a></u></p><p><u><a href="https://israelhayom.com/2026/01/18/iranian-state-tv-hacked-air-anti-regime-messages" rel="noopener noreferrer" target="_blank">https://israelhayom.com/2026/01/18/iranian-state-tv-hacked-air-anti-regime-messages</a></u></p><p><u><a href="https://therecord.media/anchorage-police-takes-servers-offline-after-third-party-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/anchorage-police-takes-servers-offline-after-third-party-attack</a></u></p><p><u><a href="https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/</a></u></p><p><u><a href="https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers" rel="noopener noreferrer" target="_blank">https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers</a></u></p><p><u><a href="https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-sitecore-zero-day-for-initial-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-sitecore-zero-day-for-initial-access/</a></u></p><p><u><a href="https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html</a></u></p><p><u><a href="https://therecord.media/nsa-cyber-command-nom-joshua-rudd-senate-hearing" rel="noopener noreferrer" target="_blank">https://therecord.media/nsa-cyber-command-nom-joshua-rudd-senate-hearing</a></u></p><p><u><a href="https://therecord.media/guilty-plea-initial-access-broker-r1z" rel="noopener noreferrer" target="_blank">https://therecord.media/guilty-plea-initial-access-broker-r1z</a></u></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2a93dc12-cce9-4dc3-a27e-6731336226e4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 19 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2a93dc12-cce9-4dc3-a27e-6731336226e4.mp3" length="8131628" type="audio/mpeg"/><itunes:duration>16:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1045</itunes:episode><podcast:episode>1045</podcast:episode></item><item><title>South Korean Giant Kyowon Ransomware Data Theft, Poland Cyberattack Grid Russia, Beijing Bans US Israeli Cyber Software</title><itunes:title>South Korean Giant Kyowon Ransomware Data Theft, Poland Cyberattack Grid Russia, Beijing Bans US Israeli Cyber Software</itunes:title><description><![CDATA[<p>🎙️ South Korean Giant Kyowon Ransomware Data Theft, Poland Cyberattack Grid Russia, Beijing Bans US Israeli Cyber Software</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1044: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Microsoft Disrupts RedVDS Cybercrime Scam Infrastructure </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>France Fines Free Mobile $42 Million Over 2024 Data Breach Incident </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Investor Lawsuit Over CrowdStrike Outage Dismissed by Court</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/</a></p><p><a href="https://therecord.media/poland-cyberattack-grid-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-cyberattack-grid-russia</a></p><p><a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/</a></p><p><a href="https://therecord.media/microsoft-redvds-cybercrime-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/microsoft-redvds-cybercrime-scam</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-million-over-2024-data-breach-incident/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-million-over-2024-data-breach-incident/</a></p><p><a href="https://www.securityweek.com/investor-lawsuit-over-crowdstrike-outage-dismissed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/investor-lawsuit-over-crowdstrike-outage-dismissed/</a></p><p><a href="https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html</a></p><p><a href="https://thecyberexpress.com/ms-isac-fortinet-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ms-isac-fortinet-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/predator-spywares-granular-anti-analysis-features-exposed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/predator-spywares-granular-anti-analysis-features-exposed/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-trump-renominate-sean-plankey/809614/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-trump-renominate-sean-plankey/809614/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ South Korean Giant Kyowon Ransomware Data Theft, Poland Cyberattack Grid Russia, Beijing Bans US Israeli Cyber Software</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. </p><p>Ep – 1044: Today's episode will discuss the latest news:  </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Microsoft Disrupts RedVDS Cybercrime Scam Infrastructure </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>France Fines Free Mobile $42 Million Over 2024 Data Breach Incident </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Investor Lawsuit Over CrowdStrike Outage Dismissed by Court</li></ol><br/><p>✅ <strong>Story Links:</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/</a></p><p><a href="https://therecord.media/poland-cyberattack-grid-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-cyberattack-grid-russia</a></p><p><a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/</a></p><p><a href="https://therecord.media/microsoft-redvds-cybercrime-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/microsoft-redvds-cybercrime-scam</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-million-over-2024-data-breach-incident/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-fines-free-mobile-42-million-over-2024-data-breach-incident/</a></p><p><a href="https://www.securityweek.com/investor-lawsuit-over-crowdstrike-outage-dismissed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/investor-lawsuit-over-crowdstrike-outage-dismissed/</a></p><p><a href="https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html</a></p><p><a href="https://thecyberexpress.com/ms-isac-fortinet-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ms-isac-fortinet-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/predator-spywares-granular-anti-analysis-features-exposed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/predator-spywares-granular-anti-analysis-features-exposed/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-trump-renominate-sean-plankey/809614/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-trump-renominate-sean-plankey/809614/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype <a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a> </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber-attack <a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a> </p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall <a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk <a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups <a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a> </p><p>============================= </p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p>For Collaboration and Business inquiries, please use the contact information below: 📩 Email: <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p> ================================= </p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d95e806c-148b-427b-b0d5-c4bbde446657</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 15 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d95e806c-148b-427b-b0d5-c4bbde446657.mp3" length="24713971" type="audio/mpeg"/><itunes:duration>17:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1044</itunes:episode><podcast:episode>1044</podcast:episode></item><item><title>Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft</title><itunes:title>Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft</itunes:title><description><![CDATA[<p>🎙️ Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1043: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adobe Patches Critical Apache Tika Bug in ColdFusion </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SAP's January 2026 Security Updates Patch Critical Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ServiceNow Patches Critical AI Platform Vulnerabilities</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/</a></p><p><a href="https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations" rel="noopener noreferrer" target="_blank">https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations</a></p><p><a href="https://www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/</a></p><p><a href="https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html</a></p><p><a href="https://www.securityweek.com/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disrupt-networks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disrupt-networks/</a></p><p><a href="https://cybersecuritynews.com/fortios-and-fortiswitchmanager-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortios-and-fortiswitchmanager-vulnerability/</a></p><p><a href="https://therecord.media/ukraine-parliament-approves-resignation-sbu-chief" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-parliament-approves-resignation-sbu-chief</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-browser-security-firm-seraphic-for-420-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-browser-security-firm-seraphic-for-420-million/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1043: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adobe Patches Critical Apache Tika Bug in ColdFusion </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>SAP's January 2026 Security Updates Patch Critical Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>ServiceNow Patches Critical AI Platform Vulnerabilities</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/</a></p><p><a href="https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations" rel="noopener noreferrer" target="_blank">https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations</a></p><p><a href="https://www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/</a></p><p><a href="https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html</a></p><p><a href="https://www.securityweek.com/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disrupt-networks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disrupt-networks/</a></p><p><a href="https://cybersecuritynews.com/fortios-and-fortiswitchmanager-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/fortios-and-fortiswitchmanager-vulnerability/</a></p><p><a href="https://therecord.media/ukraine-parliament-approves-resignation-sbu-chief" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-parliament-approves-resignation-sbu-chief</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-browser-security-firm-seraphic-for-420-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-browser-security-firm-seraphic-for-420-million/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fe4d220f-c954-48b3-afd6-14ec3af6de68</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 14 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fe4d220f-c954-48b3-afd6-14ec3af6de68.mp3" length="8065772" type="audio/mpeg"/><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1043</itunes:episode><podcast:episode>1043</podcast:episode></item><item><title>University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline</title><itunes:title>University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline</itunes:title><description><![CDATA[<p>🎙️ University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1042: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russia's APT28 Targeting Energy Research Defense Collaboration Entities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Instagram Fixes Password Reset Vulnerability Amid User Data Leak</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/</a></p><p><a href="https://www.securityweek.com/russias-apt28-targeting-energy-research-defense-collaboration-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russias-apt28-targeting-energy-research-defense-collaboration-entities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/instagram-fixes-password-reset-vulnerability-amid-user-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/instagram-fixes-password-reset-vulnerability-amid-user-data-leak/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/</a></p><p><a href="https://www.securityweek.com/llms-in-attacker-crosshairs-warns-threat-intel-firm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/llms-in-attacker-crosshairs-warns-threat-intel-firm/</a></p><p><a href="https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html</a></p><p><a href="https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1042: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russia's APT28 Targeting Energy Research Defense Collaboration Entities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Instagram Fixes Password Reset Vulnerability Amid User Data Leak</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/</a></p><p><a href="https://www.securityweek.com/russias-apt28-targeting-energy-research-defense-collaboration-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russias-apt28-targeting-energy-research-defense-collaboration-entities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/instagram-fixes-password-reset-vulnerability-amid-user-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/instagram-fixes-password-reset-vulnerability-amid-user-data-leak/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/</a></p><p><a href="https://www.securityweek.com/llms-in-attacker-crosshairs-warns-threat-intel-firm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/llms-in-attacker-crosshairs-warns-threat-intel-firm/</a></p><p><a href="https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html</a></p><p><a href="https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">404f7982-dc6c-4f8c-81f6-35f0cf437cb8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 13 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/404f7982-dc6c-4f8c-81f6-35f0cf437cb8.mp3" length="7997996" type="audio/mpeg"/><itunes:duration>16:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1042</itunes:episode><podcast:episode>1042</podcast:episode></item><item><title>Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K</title><itunes:title>Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K</itunes:title><description><![CDATA[<p>🎙️ Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1041: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese-Linked Hackers Exploit VMware Zero-Day Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FBI: North Korean Spear Phishing Attacks Use Malicious QR Codes</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/</a></p><p><a href="https://therecord.media/26-million-in-crypto-stolen-truebit" rel="noopener noreferrer" target="_blank">https://therecord.media/26-million-in-crypto-stolen-truebit</a></p><p><a href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/</a></p><p><a href="https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/</a></p><p><a href="https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html</a></p><p><a href="https://www.securityweek.com/fbi-north-korean-spear-phishing-attacks-use-malicious-qr-codes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-north-korean-spear-phishing-attacks-use-malicious-qr-codes/</a></p><p><a href="https://www.securityweek.com/trend-micro-patches-critical-code-execution-flaw-in-apex-central/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trend-micro-patches-critical-code-execution-flaw-in-apex-central/</a></p><p><a href="https://therecord.media/france-frees-russian-basketball-player-ransomware-swap" rel="noopener noreferrer" target="_blank">https://therecord.media/france-frees-russian-basketball-player-ransomware-swap</a></p><p><a href="https://cybersecuritynews.com/europol-backed-operation-leads-to-34-arrests-in-black-axe/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/europol-backed-operation-leads-to-34-arrests-in-black-axe/</a></p><p><a href="https://www.securityweek.com/tim-kosiba-named-nsa-deputy-director/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tim-kosiba-named-nsa-deputy-director/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1041: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Chinese-Linked Hackers Exploit VMware Zero-Day Vulnerabilities </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FBI: North Korean Spear Phishing Attacks Use Malicious QR Codes</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/</a></p><p><a href="https://therecord.media/26-million-in-crypto-stolen-truebit" rel="noopener noreferrer" target="_blank">https://therecord.media/26-million-in-crypto-stolen-truebit</a></p><p><a href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/</a></p><p><a href="https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploit-for-vmware-zero-day-flaws-likely-built-a-year-before-public-disclosure/</a></p><p><a href="https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html</a></p><p><a href="https://www.securityweek.com/fbi-north-korean-spear-phishing-attacks-use-malicious-qr-codes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-north-korean-spear-phishing-attacks-use-malicious-qr-codes/</a></p><p><a href="https://www.securityweek.com/trend-micro-patches-critical-code-execution-flaw-in-apex-central/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trend-micro-patches-critical-code-execution-flaw-in-apex-central/</a></p><p><a href="https://therecord.media/france-frees-russian-basketball-player-ransomware-swap" rel="noopener noreferrer" target="_blank">https://therecord.media/france-frees-russian-basketball-player-ransomware-swap</a></p><p><a href="https://cybersecuritynews.com/europol-backed-operation-leads-to-34-arrests-in-black-axe/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/europol-backed-operation-leads-to-34-arrests-in-black-axe/</a></p><p><a href="https://www.securityweek.com/tim-kosiba-named-nsa-deputy-director/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tim-kosiba-named-nsa-deputy-director/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d1eab012-3ea9-4475-9ab5-e69924ed5f6c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 12 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d1eab012-3ea9-4475-9ab5-e69924ed5f6c.mp3" length="8501804" type="audio/mpeg"/><itunes:duration>17:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1041</itunes:episode><podcast:episode>1041</podcast:episode></item><item><title>Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan</title><itunes:title>Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan</itunes:title><description><![CDATA[<p>🎙️ Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1040: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Australia's Scams Framework Criticized Over Major Exclusions </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Alleged Cyber Scam Kingpin in Cambodia Arrested and Extradited </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>VMware ESXi Exploited Using New Toolkit in Attacks</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/spanish-airline-attributes-recent-breach-allegation-to-nov-incident" rel="noopener noreferrer" target="_blank">https://therecord.media/spanish-airline-attributes-recent-breach-allegation-to-nov-incident</a></p><p><a href="https://therecord.media/illinois-agency-exposed-data" rel="noopener noreferrer" target="_blank">https://therecord.media/illinois-agency-exposed-data</a></p><p><a href="https://www.gov.uk/government/publications/government-cyber-action-plan/government-cyber-action-plan#chapter-1" rel="noopener noreferrer" target="_blank">https://www.gov.uk/government/publications/government-cyber-action-plan/government-cyber-action-plan#chapter-1</a></p><p><a href="https://www.bankinfosecurity.com/australias-scams-framework-criticized-over-major-exclusions-a-30458" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australias-scams-framework-criticized-over-major-exclusions-a-30458</a></p><p><a href="https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited" rel="noopener noreferrer" target="_blank">https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited</a></p><p><a href="https://cybersecuritynews.com/vmware-esxi-exploited-toolkit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/vmware-esxi-exploited-toolkit/</a></p><p><a href="https://www.securityweek.com/chrome-extensions-with-900000-downloads-caught-stealing-ai-chats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-extensions-with-900000-downloads-caught-stealing-ai-chats/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/</a></p><p><a href="https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1040: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Australia's Scams Framework Criticized Over Major Exclusions </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Alleged Cyber Scam Kingpin in Cambodia Arrested and Extradited </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>VMware ESXi Exploited Using New Toolkit in Attacks</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/spanish-airline-attributes-recent-breach-allegation-to-nov-incident" rel="noopener noreferrer" target="_blank">https://therecord.media/spanish-airline-attributes-recent-breach-allegation-to-nov-incident</a></p><p><a href="https://therecord.media/illinois-agency-exposed-data" rel="noopener noreferrer" target="_blank">https://therecord.media/illinois-agency-exposed-data</a></p><p><a href="https://www.gov.uk/government/publications/government-cyber-action-plan/government-cyber-action-plan#chapter-1" rel="noopener noreferrer" target="_blank">https://www.gov.uk/government/publications/government-cyber-action-plan/government-cyber-action-plan#chapter-1</a></p><p><a href="https://www.bankinfosecurity.com/australias-scams-framework-criticized-over-major-exclusions-a-30458" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australias-scams-framework-criticized-over-major-exclusions-a-30458</a></p><p><a href="https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited" rel="noopener noreferrer" target="_blank">https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited</a></p><p><a href="https://cybersecuritynews.com/vmware-esxi-exploited-toolkit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/vmware-esxi-exploited-toolkit/</a></p><p><a href="https://www.securityweek.com/chrome-extensions-with-900000-downloads-caught-stealing-ai-chats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-extensions-with-900000-downloads-caught-stealing-ai-chats/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/</a></p><p><a href="https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">dc51c4f1-f5fe-4d94-bc4d-068978011eef</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 08 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/dc51c4f1-f5fe-4d94-bc4d-068978011eef.mp3" length="8569580" type="audio/mpeg"/><itunes:duration>17:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1040</itunes:episode><podcast:episode>1040</podcast:episode></item><item><title>Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges</title><itunes:title>Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges</itunes:title><description><![CDATA[<p>🎙️ Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1039: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical Dolby Vulnerability Patched in Android Devices </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Veeam Patches Critical RCE Vulnerability in Backup Software </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>N8N Warns of CVSS 10.0 RCE Vulnerability in Automation Platform</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/jaguar-land-rover-wholesale-volumes-down-43-percent-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jaguar-land-rover-wholesale-volumes-down-43-percent-after-cyberattack/</a></p><p><a href="https://therecord.media/uk-government-cyber-action-plan" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-cyber-action-plan</a></p><p><a href="https://www.bleepingcomputer.com/news/security/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/</a></p><p><a href="https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/</a></p><p><a href="https://thehackernews.com/2026/01/veeam-patches-critical-rce.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/veeam-patches-critical-rce.html</a></p><p><a href="https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html</a></p><p><a href="https://cybersecuritynews.com/lockbit-5-0-emerges/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lockbit-5-0-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/toddycat-malware-compromises-microsoft-exchange-servers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/toddycat-malware-compromises-microsoft-exchange-servers/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1039: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical Dolby Vulnerability Patched in Android Devices </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Veeam Patches Critical RCE Vulnerability in Backup Software </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>N8N Warns of CVSS 10.0 RCE Vulnerability in Automation Platform</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.bleepingcomputer.com/news/security/jaguar-land-rover-wholesale-volumes-down-43-percent-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jaguar-land-rover-wholesale-volumes-down-43-percent-after-cyberattack/</a></p><p><a href="https://therecord.media/uk-government-cyber-action-plan" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-cyber-action-plan</a></p><p><a href="https://www.bleepingcomputer.com/news/security/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/</a></p><p><a href="https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/</a></p><p><a href="https://thehackernews.com/2026/01/veeam-patches-critical-rce.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/veeam-patches-critical-rce.html</a></p><p><a href="https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html</a></p><p><a href="https://cybersecuritynews.com/lockbit-5-0-emerges/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lockbit-5-0-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/toddycat-malware-compromises-microsoft-exchange-servers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/toddycat-malware-compromises-microsoft-exchange-servers/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d0f285a8-840d-4611-a6eb-8e650c6b06e6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 07 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d0f285a8-840d-4611-a6eb-8e650c6b06e6.mp3" length="7056428" type="audio/mpeg"/><itunes:duration>14:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1039</itunes:episode><podcast:episode>1039</podcast:episode></item><item><title>Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims</title><itunes:title>Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims</itunes:title><description><![CDATA[<p>🎙️ Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1038: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China Cyberattacks on Taiwan Escalate in Sophisticated Campaigns </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Hackers Target Europe Hospitality Sector with Blue Screen Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russia-Aligned Hackers Abuse Viber to Deploy Malware</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/brightspeed-investigating-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/brightspeed-investigating-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/</a></p><p><a href="https://www.techrepublic.com/article/news-china-cyberattacks-taiwan/" rel="noopener noreferrer" target="_blank">https://www.techrepublic.com/article/news-china-cyberattacks-taiwan/</a></p><p><a href="https://therecord.media/russian-hackers-europe-hospitality-blue-screen" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hackers-europe-hospitality-blue-screen</a></p><p><a href="https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html</a></p><p><a href="https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/</a></p><p><a href="https://cybersecuritynews.com/threat-actor-exploited-fortiweb-appliances-to-deploy-sliver-c2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actor-exploited-fortiweb-appliances-to-deploy-sliver-c2/</a></p><p><a href="https://cybernews.com/security/openai-says-prompt-injection-attacks-long-term-security-challenge/" rel="noopener noreferrer" target="_blank">https://cybernews.com/security/openai-says-prompt-injection-attacks-long-term-security-challenge/</a></p><p><a href="https://thecyberexpress.com/cisa-known-exploited-vulnerabilities-kev-2025/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-known-exploited-vulnerabilities-kev-2025/</a></p><p><a href="https://okstupid.lol/" rel="noopener noreferrer" target="_blank">https://okstupid.lol/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1038: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China Cyberattacks on Taiwan Escalate in Sophisticated Campaigns </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russian Hackers Target Europe Hospitality Sector with Blue Screen Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Russia-Aligned Hackers Abuse Viber to Deploy Malware</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/brightspeed-investigating-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/brightspeed-investigating-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/</a></p><p><a href="https://www.techrepublic.com/article/news-china-cyberattacks-taiwan/" rel="noopener noreferrer" target="_blank">https://www.techrepublic.com/article/news-china-cyberattacks-taiwan/</a></p><p><a href="https://therecord.media/russian-hackers-europe-hospitality-blue-screen" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hackers-europe-hospitality-blue-screen</a></p><p><a href="https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html</a></p><p><a href="https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researcher-spotlights-whatsapp-metadata-leak-as-meta-begins-rolling-out-fixes/</a></p><p><a href="https://cybersecuritynews.com/threat-actor-exploited-fortiweb-appliances-to-deploy-sliver-c2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actor-exploited-fortiweb-appliances-to-deploy-sliver-c2/</a></p><p><a href="https://cybernews.com/security/openai-says-prompt-injection-attacks-long-term-security-challenge/" rel="noopener noreferrer" target="_blank">https://cybernews.com/security/openai-says-prompt-injection-attacks-long-term-security-challenge/</a></p><p><a href="https://thecyberexpress.com/cisa-known-exploited-vulnerabilities-kev-2025/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-known-exploited-vulnerabilities-kev-2025/</a></p><p><a href="https://okstupid.lol/" rel="noopener noreferrer" target="_blank">https://okstupid.lol/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">bbf467b1-af18-4c4e-b417-4140739e6fda</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 06 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/bbf467b1-af18-4c4e-b417-4140739e6fda.mp3" length="8848172" type="audio/mpeg"/><itunes:duration>18:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1038</itunes:episode><podcast:episode>1038</podcast:episode></item><item><title>Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed</title><itunes:title>Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed</itunes:title><description><![CDATA[<p>🎙️ Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1037: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rondodox Botnet Exploiting React2Shell Vulnerability </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercriminals Abuse Google Cloud Email Services for Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Handala Hackers Targeted Israeli Officials in Espionage Campaign</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/sedgwick-cyber-incident-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/sedgwick-cyber-incident-ransomware</a></p><p><a href="https://www.securityweek.com/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/</a></p><p><a href="https://www.securityweek.com/adobe-coldfusion-servers-targeted-in-coordinated-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-coldfusion-servers-targeted-in-coordinated-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/</a></p><p><a href="https://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html</a></p><p><a href="https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/</a></p><p><a href="https://therecord.media/finland-arrests-crew-ship-suspected-cable-break" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-arrests-crew-ship-suspected-cable-break</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1037: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Rondodox Botnet Exploiting React2Shell Vulnerability </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybercriminals Abuse Google Cloud Email Services for Attacks </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Handala Hackers Targeted Israeli Officials in Espionage Campaign</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/sedgwick-cyber-incident-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/sedgwick-cyber-incident-ransomware</a></p><p><a href="https://www.securityweek.com/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/</a></p><p><a href="https://www.securityweek.com/adobe-coldfusion-servers-targeted-in-coordinated-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-coldfusion-servers-targeted-in-coordinated-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/</a></p><p><a href="https://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/</a></p><p><a href="https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html</a></p><p><a href="https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/</a></p><p><a href="https://therecord.media/finland-arrests-crew-ship-suspected-cable-break" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-arrests-crew-ship-suspected-cable-break</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8bb58d4d-9334-4ac5-8eca-586317f723d2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 05 Jan 2026 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8bb58d4d-9334-4ac5-8eca-586317f723d2.mp3" length="7832108" type="audio/mpeg"/><itunes:duration>16:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1037</itunes:episode><podcast:episode>1037</podcast:episode></item><item><title>European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist</title><itunes:title>European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist</itunes:title><description><![CDATA[<p>🎙️ European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1036: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Microsoft Azure Back Up After Global Meltdown and Service Disruption </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Treasury Sanctions Against Intellexa Spyware Vendor Removed </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>IBM Warns of Critical API Connect Auth Bypass Vulnerability</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/european-space-agency-confirms-breach-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/european-space-agency-confirms-breach-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/shai-hulud-supply-chain-attack-led-to-8-5-million-trust-wallet-heist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/shai-hulud-supply-chain-attack-led-to-8-5-million-trust-wallet-heist/</a></p><p><a href="https://www.israelhayom.com/2025/12/30/microsofts-azure-back-up-after-global-meltdown/" rel="noopener noreferrer" target="_blank">https://www.israelhayom.com/2025/12/30/microsofts-azure-back-up-after-global-meltdown/</a></p><p><a href="https://therecord.media/treasury-sanctions-intellexa-removed" rel="noopener noreferrer" target="_blank">https://therecord.media/treasury-sanctions-intellexa-removed</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-advertising-ai-enhanced-metamorphic-crypter/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-advertising-ai-enhanced-metamorphic-crypter/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/disney-will-pay-10m-to-settle-claims-of-childrens-privacy-violations-on-youtube/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/disney-will-pay-10m-to-settle-claims-of-childrens-privacy-violations-on-youtube/</a></p><p><a href="https://www.securityweek.com/8-cybersecurity-acquisitions-surpassed-1-billion-mark-in-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/8-cybersecurity-acquisitions-surpassed-1-billion-mark-in-2025/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1036: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Microsoft Azure Back Up After Global Meltdown and Service Disruption </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Treasury Sanctions Against Intellexa Spyware Vendor Removed </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>IBM Warns of Critical API Connect Auth Bypass Vulnerability</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/european-space-agency-confirms-breach-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/european-space-agency-confirms-breach-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/shai-hulud-supply-chain-attack-led-to-8-5-million-trust-wallet-heist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/shai-hulud-supply-chain-attack-led-to-8-5-million-trust-wallet-heist/</a></p><p><a href="https://www.israelhayom.com/2025/12/30/microsofts-azure-back-up-after-global-meltdown/" rel="noopener noreferrer" target="_blank">https://www.israelhayom.com/2025/12/30/microsofts-azure-back-up-after-global-meltdown/</a></p><p><a href="https://therecord.media/treasury-sanctions-intellexa-removed" rel="noopener noreferrer" target="_blank">https://therecord.media/treasury-sanctions-intellexa-removed</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-advertising-ai-enhanced-metamorphic-crypter/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-advertising-ai-enhanced-metamorphic-crypter/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/disney-will-pay-10m-to-settle-claims-of-childrens-privacy-violations-on-youtube/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/disney-will-pay-10m-to-settle-claims-of-childrens-privacy-violations-on-youtube/</a></p><p><a href="https://www.securityweek.com/8-cybersecurity-acquisitions-surpassed-1-billion-mark-in-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/8-cybersecurity-acquisitions-surpassed-1-billion-mark-in-2025/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">438254a5-a1cd-4283-b418-87b2c3facf63</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 31 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/438254a5-a1cd-4283-b418-87b2c3facf63.mp3" length="9610988" type="audio/mpeg"/><itunes:duration>20:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1036</itunes:episode><podcast:episode>1036</podcast:episode></item><item><title>Condé Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft Hits 2,596 Wallets, and Korean Air Falls to Oracle EBS Campaign</title><itunes:title>Condé Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft Hits 2,596 Wallets, and Korean Air Falls to Oracle EBS Campaign</itunes:title><description><![CDATA[<p>🎙️ Conde Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft 2,596 Wallets, Korean Air Oracle Hack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1035: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Former Coinbase Support Agent Arrested for Helping Hackers </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Arrested for KMSAuto Malware Campaign with 28 Million Downloads </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>InfoStealer Malware Delivered in EmEditor Supply Chain Attack</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/hacker-claims-theft-of-40-million-conde-nast-records-after-wired-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-claims-theft-of-40-million-conde-nast-records-after-wired-data-leak/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trust-wallet-says-7-million-crypto-theft-attack-drained-2-596-wallets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trust-wallet-says-7-million-crypto-theft-attack-drained-2-596-wallets/</a></p><p><a href="https://therecord.media/banks-marquis-software-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/banks-marquis-software-ransomware</a></p><p><a href="https://www.securityweek.com/korean-air-data-compromised-in-oracle-ebs-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/korean-air-data-compromised-in-oracle-ebs-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/former-coinbase-support-agent-arrested-for-helping-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/former-coinbase-support-agent-arrested-for-helping-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-arrested-for-kmsauto-malware-campaign-with-28-million-downloads/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-arrested-for-kmsauto-malware-campaign-with-28-million-downloads/</a></p><p><a href="https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chinese-apt-mustang-panda-caught-using-kernel-mode-rootkit/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-apt-mustang-panda-caught-using-kernel-mode-rootkit/</a></p><p><a href="https://cybersecuritynews.com/hackers-exploit-copilot-studios-new-connected-agents-feature/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-exploit-copilot-studios-new-connected-agents-feature/</a></p><p><a href="https://therecord.media/french-software-fined-cnil" rel="noopener noreferrer" target="_blank">https://therecord.media/french-software-fined-cnil</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Conde Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft 2,596 Wallets, Korean Air Oracle Hack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1035: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Former Coinbase Support Agent Arrested for Helping Hackers </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Arrested for KMSAuto Malware Campaign with 28 Million Downloads </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>InfoStealer Malware Delivered in EmEditor Supply Chain Attack</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.securityweek.com/hacker-claims-theft-of-40-million-conde-nast-records-after-wired-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-claims-theft-of-40-million-conde-nast-records-after-wired-data-leak/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trust-wallet-says-7-million-crypto-theft-attack-drained-2-596-wallets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trust-wallet-says-7-million-crypto-theft-attack-drained-2-596-wallets/</a></p><p><a href="https://therecord.media/banks-marquis-software-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/banks-marquis-software-ransomware</a></p><p><a href="https://www.securityweek.com/korean-air-data-compromised-in-oracle-ebs-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/korean-air-data-compromised-in-oracle-ebs-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/former-coinbase-support-agent-arrested-for-helping-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/former-coinbase-support-agent-arrested-for-helping-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-arrested-for-kmsauto-malware-campaign-with-28-million-downloads/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-arrested-for-kmsauto-malware-campaign-with-28-million-downloads/</a></p><p><a href="https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chinese-apt-mustang-panda-caught-using-kernel-mode-rootkit/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-apt-mustang-panda-caught-using-kernel-mode-rootkit/</a></p><p><a href="https://cybersecuritynews.com/hackers-exploit-copilot-studios-new-connected-agents-feature/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-exploit-copilot-studios-new-connected-agents-feature/</a></p><p><a href="https://therecord.media/french-software-fined-cnil" rel="noopener noreferrer" target="_blank">https://therecord.media/french-software-fined-cnil</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6ffb8807-9903-4b4d-b6ba-780617ce6cc4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 30 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6ffb8807-9903-4b4d-b6ba-780617ce6cc4.mp3" length="8189036" type="audio/mpeg"/><itunes:duration>17:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1035</itunes:episode><podcast:episode>1035</podcast:episode></item><item><title>Iranian Hacker Claims It Hacked Phone of Israeli PM&apos;s Chief of Staff, Hacker Claims to Leak Wired Database with 2.3 Million Records, LastPass 2022 Breach Led to Consequences, Pro-Russian Claim Cyberattack on French Postal Service</title><itunes:title>Iranian Hacker Claims It Hacked Phone of Israeli PM&apos;s Chief of Staff, Hacker Claims to Leak Wired Database with 2.3 Million Records, LastPass 2022 Breach Led to Consequences, Pro-Russian Claim Cyberattack on French Postal Service</itunes:title><description><![CDATA[<p>🎙️ Iran Hackers Claim Israeli PM Staff Phone Hack, Wired Database 2.3M Records Leaked, LastPass 2022 Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1034: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pro-Russian Hackers Claim Cyberattack on French Postal Service </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Republic of Georgia Former Spy Chief Arrested in Scam Centers Investigation </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New MongoDB Flaw Lets Unauthenticated Attackers Access Databases </li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.i24news.tv/en/news/israel/politics/artc-iranian-hacker-group-claims-it-hacked-the-phone-of-the-prime-minister-s-chief-of-staff" rel="noopener noreferrer" target="_blank">https://www.i24news.tv/en/news/israel/politics/artc-iranian-hacker-group-claims-it-hacked-the-phone-of-the-prime-minister-s-chief-of-staff</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-claims-to-leak-wired-database-with-23-million-records/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-claims-to-leak-wired-database-with-23-million-records/</a></p><p><a href="https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long.html</a></p><p><a href="https://www.securityweek.com/pro-russian-hackers-claim-cyberattack-on-french-postal-service/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pro-russian-hackers-claim-cyberattack-on-french-postal-service/</a></p><p><a href="https://therecord.media/republic-of-georgia-former-spy-chief-arrested-scam-centers" rel="noopener noreferrer" target="_blank">https://therecord.media/republic-of-georgia-former-spy-chief-arrested-scam-centers</a></p><p><a href="https://thehackernews.com/2025/12/new-mongodb-flaw-lets-unauthenticated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/new-mongodb-flaw-lets-unauthenticated.html</a></p><p><a href="https://thecyberexpress.com/cve-2025-68615-critical-net-snmp-snmptrapd/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2025-68615-critical-net-snmp-snmptrapd/</a></p><p><a href="https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html</a></p><p><a href="https://therecord.media/cyber-volunteer-water-utility-mssp" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-volunteer-water-utility-mssp</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Iran Hackers Claim Israeli PM Staff Phone Hack, Wired Database 2.3M Records Leaked, LastPass 2022 Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1034: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Pro-Russian Hackers Claim Cyberattack on French Postal Service </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Republic of Georgia Former Spy Chief Arrested in Scam Centers Investigation </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>New MongoDB Flaw Lets Unauthenticated Attackers Access Databases </li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://www.i24news.tv/en/news/israel/politics/artc-iranian-hacker-group-claims-it-hacked-the-phone-of-the-prime-minister-s-chief-of-staff" rel="noopener noreferrer" target="_blank">https://www.i24news.tv/en/news/israel/politics/artc-iranian-hacker-group-claims-it-hacked-the-phone-of-the-prime-minister-s-chief-of-staff</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-claims-to-leak-wired-database-with-23-million-records/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-claims-to-leak-wired-database-with-23-million-records/</a></p><p><a href="https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long.html</a></p><p><a href="https://www.securityweek.com/pro-russian-hackers-claim-cyberattack-on-french-postal-service/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pro-russian-hackers-claim-cyberattack-on-french-postal-service/</a></p><p><a href="https://therecord.media/republic-of-georgia-former-spy-chief-arrested-scam-centers" rel="noopener noreferrer" target="_blank">https://therecord.media/republic-of-georgia-former-spy-chief-arrested-scam-centers</a></p><p><a href="https://thehackernews.com/2025/12/new-mongodb-flaw-lets-unauthenticated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/new-mongodb-flaw-lets-unauthenticated.html</a></p><p><a href="https://thecyberexpress.com/cve-2025-68615-critical-net-snmp-snmptrapd/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2025-68615-critical-net-snmp-snmptrapd/</a></p><p><a href="https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html</a></p><p><a href="https://therecord.media/cyber-volunteer-water-utility-mssp" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-volunteer-water-utility-mssp</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">89744b55-1142-43ca-b308-c248651b3d61</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 29 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/89744b55-1142-43ca-b308-c248651b3d61.mp3" length="7804844" type="audio/mpeg"/><itunes:duration>16:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1034</itunes:episode><podcast:episode>1034</podcast:episode></item><item><title>22.7 Million Impacted in Aflac Data Breach, Shinhan Card Data Breach, Nova Scotia Power Incident Report Confirms Cyberattack, FCC Bans Foreign Made Drones and Key Communication Equipment</title><itunes:title>22.7 Million Impacted in Aflac Data Breach, Shinhan Card Data Breach, Nova Scotia Power Incident Report Confirms Cyberattack, FCC Bans Foreign Made Drones and Key Communication Equipment</itunes:title><description><![CDATA[<p>🎙️ Aflac 2.2M Breach, Shinhan Card Data Breach, Nova Scotia Power Cyberattack, FCC Bans Foreign Drones</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1033: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical MongoDB Vulnerability Threatens Database Security </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat Actors Using Weaponized Antivirus Themed Word Documents </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>US Disrupts Bank Account Takeover Operation Web3AdsPanels</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/22-million-impacted-aflac-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/22-million-impacted-aflac-breach</a></p><p><a href="https://www.chinadailyasia.com/hk/article/625998" rel="noopener noreferrer" target="_blank">https://www.chinadailyasia.com/hk/article/625998</a></p><p><a href="https://thecyberexpress.com/shinhan-card-data-breach/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/shinhan-card-data-breach/</a></p><p><a href="https://www.cbc.ca/news/canada/nova-scotia/nova-scotia-power-incident-report-cyberattack-energy-board-9.7027003" rel="noopener noreferrer" target="_blank">https://www.cbc.ca/news/canada/nova-scotia/nova-scotia-power-incident-report-cyberattack-energy-board-9.7027003</a></p><p><a href="https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html</a></p><p><a href="https://cybersecuritynews.com/critical-mongodb-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/critical-mongodb-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/</a></p><p><a href="https://therecord.media/us-disrupts-bank-account-takeover-operation-web3adspanels" rel="noopener noreferrer" target="_blank">https://therecord.media/us-disrupts-bank-account-takeover-operation-web3adspanels</a></p><p><a href="https://www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/</a></p><p><a href="https://www.securityweek.com/servicenow-to-acquire-armis-for-7-75-billion-in-cash/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/servicenow-to-acquire-armis-for-7-75-billion-in-cash/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Aflac 2.2M Breach, Shinhan Card Data Breach, Nova Scotia Power Cyberattack, FCC Bans Foreign Drones</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1033: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Critical MongoDB Vulnerability Threatens Database Security </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Threat Actors Using Weaponized Antivirus Themed Word Documents </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>US Disrupts Bank Account Takeover Operation Web3AdsPanels</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/22-million-impacted-aflac-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/22-million-impacted-aflac-breach</a></p><p><a href="https://www.chinadailyasia.com/hk/article/625998" rel="noopener noreferrer" target="_blank">https://www.chinadailyasia.com/hk/article/625998</a></p><p><a href="https://thecyberexpress.com/shinhan-card-data-breach/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/shinhan-card-data-breach/</a></p><p><a href="https://www.cbc.ca/news/canada/nova-scotia/nova-scotia-power-incident-report-cyberattack-energy-board-9.7027003" rel="noopener noreferrer" target="_blank">https://www.cbc.ca/news/canada/nova-scotia/nova-scotia-power-incident-report-cyberattack-energy-board-9.7027003</a></p><p><a href="https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html</a></p><p><a href="https://cybersecuritynews.com/critical-mongodb-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/critical-mongodb-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/</a></p><p><a href="https://therecord.media/us-disrupts-bank-account-takeover-operation-web3adspanels" rel="noopener noreferrer" target="_blank">https://therecord.media/us-disrupts-bank-account-takeover-operation-web3adspanels</a></p><p><a href="https://www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/</a></p><p><a href="https://www.securityweek.com/servicenow-to-acquire-armis-for-7-75-billion-in-cash/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/servicenow-to-acquire-armis-for-7-75-billion-in-cash/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8dc44aff-7121-42b9-90e4-f2e56ff6555d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 24 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8dc44aff-7121-42b9-90e4-f2e56ff6555d.mp3" length="8406380" type="audio/mpeg"/><itunes:duration>17:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1033</itunes:episode><podcast:episode>1033</podcast:episode></item><item><title>Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach</title><itunes:title>Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach</itunes:title><description><![CDATA[<p>🎙️ Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1032: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>La Poste France DDoS Disruption Days Before Christmas </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Spotify Disables Scraping by Anna's Archive Platform </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>54 Charged in US Over ATM Attacks Involving Ploutus Malware</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/romania-national-water-agency-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/romania-national-water-agency-ransomware-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-phoenix-data-breach-impacts-nearly-35-million-individuals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-phoenix-data-breach-impacts-nearly-35-million-individuals/</a></p><p><a href="https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas" rel="noopener noreferrer" target="_blank">https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas</a></p><p><a href="https://therecord.media/spotify-disables-scraping-annas" rel="noopener noreferrer" target="_blank">https://therecord.media/spotify-disables-scraping-annas</a></p><p><a href="https://www.securityweek.com/54-charged-in-us-over-atm-attacks-involving-ploutus-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/54-charged-in-us-over-atm-attacks-involving-ploutus-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/</a></p><p><a href="https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-warns-of-continued-threat-activity-linked-to-brickstorm-malware/808499/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-warns-of-continued-threat-activity-linked-to-brickstorm-malware/808499/</a></p><p><a href="https://therecord.media/south-korea-facial-recognition-phones" rel="noopener noreferrer" target="_blank">https://therecord.media/south-korea-facial-recognition-phones</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1032: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>La Poste France DDoS Disruption Days Before Christmas </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Spotify Disables Scraping by Anna's Archive Platform </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>54 Charged in US Over ATM Attacks Involving Ploutus Malware</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/romania-national-water-agency-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/romania-national-water-agency-ransomware-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-phoenix-data-breach-impacts-nearly-35-million-individuals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-phoenix-data-breach-impacts-nearly-35-million-individuals/</a></p><p><a href="https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas" rel="noopener noreferrer" target="_blank">https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas</a></p><p><a href="https://therecord.media/spotify-disables-scraping-annas" rel="noopener noreferrer" target="_blank">https://therecord.media/spotify-disables-scraping-annas</a></p><p><a href="https://www.securityweek.com/54-charged-in-us-over-atm-attacks-involving-ploutus-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/54-charged-in-us-over-atm-attacks-involving-ploutus-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/</a></p><p><a href="https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-warns-of-continued-threat-activity-linked-to-brickstorm-malware/808499/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-warns-of-continued-threat-activity-linked-to-brickstorm-malware/808499/</a></p><p><a href="https://therecord.media/south-korea-facial-recognition-phones" rel="noopener noreferrer" target="_blank">https://therecord.media/south-korea-facial-recognition-phones</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">084a6d5c-3af5-4f4b-ba93-dd5530700bf5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 23 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/084a6d5c-3af5-4f4b-ba93-dd5530700bf5.mp3" length="7909100" type="audio/mpeg"/><itunes:duration>16:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1032</itunes:episode><podcast:episode>1032</podcast:episode></item><item><title>Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China</title><itunes:title>Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China</itunes:title><description><![CDATA[<p>🎙️ Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1031: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Docker Hardened Images Now Open Source and Available for Free </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Secure Email Devices Zero-Day Vulnerability Actively Exploited</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/senate-confirms-new-pentagon-cio" rel="noopener noreferrer" target="_blank">https://therecord.media/senate-confirms-new-pentagon-cio</a></p><p><a href="https://www.securityweek.com/north-koreas-digital-surge-2b-stolen-in-crypto-as-amazon-blocks-1800-fake-it-workers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-koreas-digital-surge-2b-stolen-in-crypto-as-amazon-blocks-1800-fake-it-workers/</a></p><p><a href="https://therecord.media/uk-foreign-office-hacked-china" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-foreign-office-hacked-china</a></p><p><a href="https://www.securityweek.com/denmark-blames-russia-for-cyberattacks-ahead-of-elections-and-on-water-utility/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/denmark-blames-russia-for-cyberattacks-ahead-of-elections-and-on-water-utility/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/docker-hardened-images-now-open-source-and-available-for-free/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/docker-hardened-images-now-open-source-and-available-for-free/</a></p><p><a href="https://cybersecuritynews.com/cisco-secure-email-devices-zero-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisco-secure-email-devices-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-25-000-forticloud-sso-devices-exposed-to-remote-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-25-000-forticloud-sso-devices-exposed-to-remote-attacks/</a></p><p><a href="https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-google-cloud-strike-multibillion-dollar-ai-and-cloud-security-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-google-cloud-strike-multibillion-dollar-ai-and-cloud-security-deal/</a></p><p><a href="https://therecord.media/trump-signs-ndaa-cyber-command" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-signs-ndaa-cyber-command</a></p><p><a href="https://www.securityweek.com/us-shuts-down-crypto-exchange-e-note-charges-russian-administrator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-shuts-down-crypto-exchange-e-note-charges-russian-administrator/</a></p><p><a href="https://www.cybersecuritydive.com/news/nist-ai-cybersecurity-framework-profile/808134/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nist-ai-cybersecurity-framework-profile/808134/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1031: Today's episode will discuss the latest news: </p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Docker Hardened Images Now Open Source and Available for Free </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cisco Secure Email Devices Zero-Day Vulnerability Actively Exploited</li></ol><br/><p><strong>✅ Story Links: </strong></p><p><a href="https://therecord.media/senate-confirms-new-pentagon-cio" rel="noopener noreferrer" target="_blank">https://therecord.media/senate-confirms-new-pentagon-cio</a></p><p><a href="https://www.securityweek.com/north-koreas-digital-surge-2b-stolen-in-crypto-as-amazon-blocks-1800-fake-it-workers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-koreas-digital-surge-2b-stolen-in-crypto-as-amazon-blocks-1800-fake-it-workers/</a></p><p><a href="https://therecord.media/uk-foreign-office-hacked-china" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-foreign-office-hacked-china</a></p><p><a href="https://www.securityweek.com/denmark-blames-russia-for-cyberattacks-ahead-of-elections-and-on-water-utility/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/denmark-blames-russia-for-cyberattacks-ahead-of-elections-and-on-water-utility/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/docker-hardened-images-now-open-source-and-available-for-free/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/docker-hardened-images-now-open-source-and-available-for-free/</a></p><p><a href="https://cybersecuritynews.com/cisco-secure-email-devices-zero-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisco-secure-email-devices-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-25-000-forticloud-sso-devices-exposed-to-remote-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-25-000-forticloud-sso-devices-exposed-to-remote-attacks/</a></p><p><a href="https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-google-cloud-strike-multibillion-dollar-ai-and-cloud-security-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-google-cloud-strike-multibillion-dollar-ai-and-cloud-security-deal/</a></p><p><a href="https://therecord.media/trump-signs-ndaa-cyber-command" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-signs-ndaa-cyber-command</a></p><p><a href="https://www.securityweek.com/us-shuts-down-crypto-exchange-e-note-charges-russian-administrator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-shuts-down-crypto-exchange-e-note-charges-russian-administrator/</a></p><p><a href="https://www.cybersecuritydive.com/news/nist-ai-cybersecurity-framework-profile/808134/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nist-ai-cybersecurity-framework-profile/808134/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>  </p><p><br></p><p><strong>🚨 Important Links to Follow: </strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a> </p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>   </p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a> </p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a> </p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a> </p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a> </p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching: </strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a><u> </u></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a> </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a> </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p> =============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>. </p><p> </p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:  <a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a> </p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews </p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ede82464-5367-4778-9969-c5f4e73e393e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 22 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ede82464-5367-4778-9969-c5f4e73e393e.mp3" length="8356844" type="audio/mpeg"/><itunes:duration>17:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1031</itunes:episode><podcast:episode>1031</podcast:episode></item><item><title>Auto Parts Giant LKQ Confirms Oracle EBS Breach, FBI Takes Down Alleged Money Laundering Operation, Cisco Warns of Unpatched AsyncOS Zero-Day, SonicWall Fixes Actively Exploited CVE</title><itunes:title>Auto Parts Giant LKQ Confirms Oracle EBS Breach, FBI Takes Down Alleged Money Laundering Operation, Cisco Warns of Unpatched AsyncOS Zero-Day, SonicWall Fixes Actively Exploited CVE</itunes:title><description><![CDATA[<p>🎙️ Auto Parts Giant LKQ Oracle EBS Breach, FBI Takes Down Money Laundering Op, Cisco AsyncOS Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1030: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical React2Shell Flaw Exploited in Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimsuky Hackers Attacking Users in Sophisticated Campaigns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Amazon Ongoing Cryptomining Campaign Uses Hacked AWS Accounts</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/auto-parts-giant-lkq-confirms-oracle-ebs-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/auto-parts-giant-lkq-confirms-oracle-ebs-breach/</a></p><p><a href="https://therecord.media/fbi-takes-down-alleged-money-laundering-operation" rel="noopener noreferrer" target="_blank">https://therecord.media/fbi-takes-down-alleged-money-laundering-operation</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-exploited-in-ransomware-attacks/</a></p><p><a href="https://cybersecuritynews.com/kimsuky-hackers-attacking-users/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/kimsuky-hackers-attacking-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/amazon-ongoing-cryptomining-campaign-uses-hacked-aws-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-ongoing-cryptomining-campaign-uses-hacked-aws-accounts/</a></p><p><a href="https://www.securityweek.com/nmfta-warns-of-surge-and-sophistication-of-cyber-enabled-cargo-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nmfta-warns-of-surge-and-sophistication-of-cyber-enabled-cargo-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-arrests-suspect-tied-to-cyberattack-on-interior-ministry/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-arrests-suspect-tied-to-cyberattack-on-interior-ministry/</a></p><p><a href="https://therecord.media/european-police-bust-ukraine-based-call-centers" rel="noopener noreferrer" target="_blank">https://therecord.media/european-police-bust-ukraine-based-call-centers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Auto Parts Giant LKQ Oracle EBS Breach, FBI Takes Down Money Laundering Op, Cisco AsyncOS Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1030: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical React2Shell Flaw Exploited in Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimsuky Hackers Attacking Users in Sophisticated Campaigns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Amazon Ongoing Cryptomining Campaign Uses Hacked AWS Accounts</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/auto-parts-giant-lkq-confirms-oracle-ebs-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/auto-parts-giant-lkq-confirms-oracle-ebs-breach/</a></p><p><a href="https://therecord.media/fbi-takes-down-alleged-money-laundering-operation" rel="noopener noreferrer" target="_blank">https://therecord.media/fbi-takes-down-alleged-money-laundering-operation</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-exploited-in-ransomware-attacks/</a></p><p><a href="https://cybersecuritynews.com/kimsuky-hackers-attacking-users/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/kimsuky-hackers-attacking-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/amazon-ongoing-cryptomining-campaign-uses-hacked-aws-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-ongoing-cryptomining-campaign-uses-hacked-aws-accounts/</a></p><p><a href="https://www.securityweek.com/nmfta-warns-of-surge-and-sophistication-of-cyber-enabled-cargo-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nmfta-warns-of-surge-and-sophistication-of-cyber-enabled-cargo-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-arrests-suspect-tied-to-cyberattack-on-interior-ministry/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-arrests-suspect-tied-to-cyberattack-on-interior-ministry/</a></p><p><a href="https://therecord.media/european-police-bust-ukraine-based-call-centers" rel="noopener noreferrer" target="_blank">https://therecord.media/european-police-bust-ukraine-based-call-centers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">65977d72-e72e-4463-8625-eda0db18dca6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 18 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/65977d72-e72e-4463-8625-eda0db18dca6.mp3" length="7465772" type="audio/mpeg"/><itunes:duration>15:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1030</itunes:episode><podcast:episode>1030</podcast:episode></item><item><title>Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach</title><itunes:title>Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach</itunes:title><description><![CDATA[<p>🎙️ Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1029: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit Newly Patched Fortinet Auth Bypass Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cellik Android Malware Builds Malicious Versions from Google Play Apps</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Sues TV Makers for Spying on Users and Selling Data Without Consent</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/russia-gru-hackers-target-energy-sector-sandworm" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-gru-hackers-target-energy-sector-sandworm</a></p><p><a href="https://www.cybersecuritydive.com/news/battery-energy-storage-systems-risk-cyberattack/807675/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/battery-energy-storage-systems-risk-cyberattack/807675/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/</a></p><p><a href="https://www.securityweek.com/700credit-data-breach-impacts-5-8-million-individuals/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/700credit-data-breach-impacts-5-8-million-individuals/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-newly-patched-fortinet-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-newly-patched-fortinet-auth-bypass-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cellik-android-malware-builds-malicious-versions-from-google-play-apps/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cellik-android-malware-builds-malicious-versions-from-google-play-apps/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/texas-sues-tv-makers-for-spying-on-users-selling-data-without-consent/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/texas-sues-tv-makers-for-spying-on-users-selling-data-without-consent/</a></p><p><a href="https://therecord.media/joshua-rudd-nomination-cyber-command-nsa" rel="noopener noreferrer" target="_blank">https://therecord.media/joshua-rudd-nomination-cyber-command-nsa</a></p><p><a href="https://therecord.media/andrew-garbarino-legislation-cyber-policy-outlook" rel="noopener noreferrer" target="_blank">https://therecord.media/andrew-garbarino-legislation-cyber-policy-outlook</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1029: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit Newly Patched Fortinet Auth Bypass Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cellik Android Malware Builds Malicious Versions from Google Play Apps</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Sues TV Makers for Spying on Users and Selling Data Without Consent</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/russia-gru-hackers-target-energy-sector-sandworm" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-gru-hackers-target-energy-sector-sandworm</a></p><p><a href="https://www.cybersecuritydive.com/news/battery-energy-storage-systems-risk-cyberattack/807675/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/battery-energy-storage-systems-risk-cyberattack/807675/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/</a></p><p><a href="https://www.securityweek.com/700credit-data-breach-impacts-5-8-million-individuals/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/700credit-data-breach-impacts-5-8-million-individuals/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-newly-patched-fortinet-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-newly-patched-fortinet-auth-bypass-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cellik-android-malware-builds-malicious-versions-from-google-play-apps/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cellik-android-malware-builds-malicious-versions-from-google-play-apps/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/texas-sues-tv-makers-for-spying-on-users-selling-data-without-consent/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/texas-sues-tv-makers-for-spying-on-users-selling-data-without-consent/</a></p><p><a href="https://therecord.media/joshua-rudd-nomination-cyber-command-nsa" rel="noopener noreferrer" target="_blank">https://therecord.media/joshua-rudd-nomination-cyber-command-nsa</a></p><p><a href="https://therecord.media/andrew-garbarino-legislation-cyber-policy-outlook" rel="noopener noreferrer" target="_blank">https://therecord.media/andrew-garbarino-legislation-cyber-policy-outlook</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d7060ad0-47a7-4f7c-9036-6ca5f3830ff4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 17 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d7060ad0-47a7-4f7c-9036-6ca5f3830ff4.mp3" length="7754732" type="audio/mpeg"/><itunes:duration>16:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1029</itunes:episode><podcast:episode>1029</podcast:episode></item><item><title>SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked</title><itunes:title>SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked</itunes:title><description><![CDATA[<p>🎙️ SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1028: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pornhub Extorted After Hackers Steal Premium Member Activity Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Militant Groups Are Experimenting with AI and the Risks Are Expected to Grow</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/</a></p><p><a href="https://therecord.media/jaguar-land-rover-confirms-staff-data-stolen-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-confirms-staff-data-stolen-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/askul-confirms-theft-of-740k-customer-records-in-ransomhouse-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/askul-confirms-theft-of-740k-customer-records-in-ransomhouse-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/</a></p><p><a href="https://www.securityweek.com/google-sees-5-chinese-groups-exploiting-react2shell-for-malware-delivery/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-sees-5-chinese-groups-exploiting-react2shell-for-malware-delivery/</a></p><p><a href="https://www.securityweek.com/militant-groups-are-experimenting-with-ai-and-the-risks-are-expected-to-grow/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/militant-groups-are-experimenting-with-ai-and-the-risks-are-expected-to-grow/</a></p><p><a href="https://therecord.media/mi6-chief-speech-russia-threats-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/mi6-chief-speech-russia-threats-warning</a></p><p><a href="https://www.securityweek.com/third-draftkings-hacker-pleads-guilty/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/third-draftkings-hacker-pleads-guilty/</a></p><p><a href="https://thecyberexpress.com/fbi-warns-alaskans-of-impersonation-scams/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fbi-warns-alaskans-of-impersonation-scams/</a></p><p><a href="https://www.bankinfosecurity.com/blogs/servicenow-eyeing-7b-buy-venture-backed-armis-p-3999" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/blogs/servicenow-eyeing-7b-buy-venture-backed-armis-p-3999</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1028: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pornhub Extorted After Hackers Steal Premium Member Activity Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Militant Groups Are Experimenting with AI and the Risks Are Expected to Grow</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/</a></p><p><a href="https://therecord.media/jaguar-land-rover-confirms-staff-data-stolen-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-confirms-staff-data-stolen-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/askul-confirms-theft-of-740k-customer-records-in-ransomhouse-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/askul-confirms-theft-of-740k-customer-records-in-ransomhouse-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/</a></p><p><a href="https://www.securityweek.com/google-sees-5-chinese-groups-exploiting-react2shell-for-malware-delivery/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-sees-5-chinese-groups-exploiting-react2shell-for-malware-delivery/</a></p><p><a href="https://www.securityweek.com/militant-groups-are-experimenting-with-ai-and-the-risks-are-expected-to-grow/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/militant-groups-are-experimenting-with-ai-and-the-risks-are-expected-to-grow/</a></p><p><a href="https://therecord.media/mi6-chief-speech-russia-threats-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/mi6-chief-speech-russia-threats-warning</a></p><p><a href="https://www.securityweek.com/third-draftkings-hacker-pleads-guilty/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/third-draftkings-hacker-pleads-guilty/</a></p><p><a href="https://thecyberexpress.com/fbi-warns-alaskans-of-impersonation-scams/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fbi-warns-alaskans-of-impersonation-scams/</a></p><p><a href="https://www.bankinfosecurity.com/blogs/servicenow-eyeing-7b-buy-venture-backed-armis-p-3999" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/blogs/servicenow-eyeing-7b-buy-venture-backed-armis-p-3999</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">256473ea-6a1b-4b4d-9a10-92cdcb9681f5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 16 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/256473ea-6a1b-4b4d-9a10-92cdcb9681f5.mp3" length="8880428" type="audio/mpeg"/><itunes:duration>18:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1028</itunes:episode><podcast:episode>1028</podcast:episode></item><item><title>Former Accenture Employee Charged Over Cybersecurity Fraud, Coupang Data Breach Traced to Ex-Employee Who Retained System Access, Apple Two Zero-Day Flaws Exploited, MITRE Releases 2025 List</title><itunes:title>Former Accenture Employee Charged Over Cybersecurity Fraud, Coupang Data Breach Traced to Ex-Employee Who Retained System Access, Apple Two Zero-Day Flaws Exploited, MITRE Releases 2025 List</itunes:title><description><![CDATA[<p>🎙️ Ex-Accenture Employee Charged Cybersecurity Fraud, Coupang Breach Ex-Employee, Apple 2 Zero-Days</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1027: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Coupang Data Breach Traced to Ex-Employee Who Retained System Access</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Germany Summons Russian Ambassador Over Cyberattack and Disinformation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/former-accenture-employee-charged-over-cybersecurity-fraud/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-accenture-employee-charged-over-cybersecurity-fraud/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/</a></p><p><a href="https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation</a></p><p><a href="https://www.securityweek.com/notepad-patches-updater-flaw-after-reports-of-traffic-hijacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notepad-patches-updater-flaw-after-reports-of-traffic-hijacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-day-flaws-exploited-in-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-day-flaws-exploited-in-sophisticated-attacks/</a></p><p><a href="https://www.securityweek.com/gladinet-centrestack-flaw-exploited-to-hack-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gladinet-centrestack-flaw-exploited-to-hack-organizations/</a></p><p><a href="https://cybersecuritynews.com/cisa-warns-of-windows-cloud-files-mini-filter-vulnerability-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisa-warns-of-windows-cloud-files-mini-filter-vulnerability-exploited/</a></p><p><a href="https://therecord.media/hamas-apt-targeting-government-agencies" rel="noopener noreferrer" target="_blank">https://therecord.media/hamas-apt-targeting-government-agencies</a></p><p><a href="https://www.securityweek.com/mitre-releases-2025-list-of-top-25-most-dangerous-software-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-releases-2025-list-of-top-25-most-dangerous-software-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/us-military-cyber-budget-jumps-to-15b-in-2026-ndaa-a-30277" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-military-cyber-budget-jumps-to-15b-in-2026-ndaa-a-30277</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Ex-Accenture Employee Charged Cybersecurity Fraud, Coupang Breach Ex-Employee, Apple 2 Zero-Days</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1027: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Coupang Data Breach Traced to Ex-Employee Who Retained System Access</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Germany Summons Russian Ambassador Over Cyberattack and Disinformation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/former-accenture-employee-charged-over-cybersecurity-fraud/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-accenture-employee-charged-over-cybersecurity-fraud/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/</a></p><p><a href="https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation</a></p><p><a href="https://www.securityweek.com/notepad-patches-updater-flaw-after-reports-of-traffic-hijacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notepad-patches-updater-flaw-after-reports-of-traffic-hijacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-day-flaws-exploited-in-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-day-flaws-exploited-in-sophisticated-attacks/</a></p><p><a href="https://www.securityweek.com/gladinet-centrestack-flaw-exploited-to-hack-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gladinet-centrestack-flaw-exploited-to-hack-organizations/</a></p><p><a href="https://cybersecuritynews.com/cisa-warns-of-windows-cloud-files-mini-filter-vulnerability-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cisa-warns-of-windows-cloud-files-mini-filter-vulnerability-exploited/</a></p><p><a href="https://therecord.media/hamas-apt-targeting-government-agencies" rel="noopener noreferrer" target="_blank">https://therecord.media/hamas-apt-targeting-government-agencies</a></p><p><a href="https://www.securityweek.com/mitre-releases-2025-list-of-top-25-most-dangerous-software-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-releases-2025-list-of-top-25-most-dangerous-software-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/us-military-cyber-budget-jumps-to-15b-in-2026-ndaa-a-30277" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-military-cyber-budget-jumps-to-15b-in-2026-ndaa-a-30277</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">833b173e-a71f-437c-93db-91c5df16d721</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 15 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/833b173e-a71f-437c-93db-91c5df16d721.mp3" length="8528108" type="audio/mpeg"/><itunes:duration>17:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1027</itunes:episode><podcast:episode>1027</podcast:episode></item><item><title>DOJ CISA Warn Russia Hackers Targeting Critical Infrastructure, Aeroflot Hacked Through Little-Known Vendor, Chrome Zero-Day Vulnerability Exploited, Intel AMD Processors Affected by PCIe Vulnerabilities</title><itunes:title>DOJ CISA Warn Russia Hackers Targeting Critical Infrastructure, Aeroflot Hacked Through Little-Known Vendor, Chrome Zero-Day Vulnerability Exploited, Intel AMD Processors Affected by PCIe Vulnerabilities</itunes:title><description><![CDATA[<p>🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1026: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Vulnerabilities Fixed by Siemens Rockwell Schneider</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New DroidLock Malware Locks Android Devices and Demands a Ransom</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure</a></p><p><a href="https://therecord.media/russia-flagship-airline-hacked-through-little-known-vendor" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-flagship-airline-hacked-through-little-known-vendor</a></p><p><a href="https://cybersecuritynews.com/chrome-0-day-vulnerability-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-0-day-vulnerability-2/</a></p><p><a href="https://www.securityweek.com/intel-amd-processors-affected-by-pcie-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-amd-processors-affected-by-pcie-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/</a></p><p><a href="https://www.securityweek.com/israeli-cybersecurity-funding-hits-4-4-billion-record-high/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/israeli-cybersecurity-funding-hits-4-4-billion-record-high/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-hacker-charged-with-helping-russian-hacktivist-groups/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainian-hacker-charged-with-helping-russian-hacktivist-groups/</a></p><p><a href="https://thecyberexpress.com/us-actions-against-carr-and-noname05716/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-actions-against-carr-and-noname05716/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1026: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Vulnerabilities Fixed by Siemens Rockwell Schneider</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New DroidLock Malware Locks Android Devices and Demands a Ransom</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure</a></p><p><a href="https://therecord.media/russia-flagship-airline-hacked-through-little-known-vendor" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-flagship-airline-hacked-through-little-known-vendor</a></p><p><a href="https://cybersecuritynews.com/chrome-0-day-vulnerability-2/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-0-day-vulnerability-2/</a></p><p><a href="https://www.securityweek.com/intel-amd-processors-affected-by-pcie-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-amd-processors-affected-by-pcie-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/</a></p><p><a href="https://www.securityweek.com/israeli-cybersecurity-funding-hits-4-4-billion-record-high/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/israeli-cybersecurity-funding-hits-4-4-billion-record-high/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-hacker-charged-with-helping-russian-hacktivist-groups/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainian-hacker-charged-with-helping-russian-hacktivist-groups/</a></p><p><a href="https://thecyberexpress.com/us-actions-against-carr-and-noname05716/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-actions-against-carr-and-noname05716/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3d7401f9-36fa-484d-a9f5-c5e6e839c652</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 11 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3d7401f9-36fa-484d-a9f5-c5e6e839c652.mp3" length="8624684" type="audio/mpeg"/><itunes:duration>17:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1026</itunes:episode><podcast:episode>1026</podcast:episode></item><item><title>Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw</title><itunes:title>Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw</itunes:title><description><![CDATA[<p>🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1025: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Warns of Critical Endpoint Manager Code Execution Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Seoul Cyber Investigators Seize Data from Korea Tech Giant</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Storm-0249 Escalates Ransomware Attacks with New Tactics</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-57-vulnerabilities-three-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-57-vulnerabilities-three-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-three-critical-vulnerabilities-across-multiple-products/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-three-critical-vulnerabilities-across-multiple-products/</a></p><p><a href="https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/</a></p><p><a href="https://therecord.media/seoul-cyber-investigators-seize-data-korea-tech-giant" rel="noopener noreferrer" target="_blank">https://therecord.media/seoul-cyber-investigators-seize-data-korea-tech-giant</a></p><p><a href="https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html</a></p><p><a href="https://thecyberexpress.com/australian-social-media-ban-takes-effect/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australian-social-media-ban-takes-effect/</a></p><p><a href="https://www.securityweek.com/uk-sanctions-russian-and-chinese-firms-suspected-of-being-malign-actors-in-information-warfare/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/uk-sanctions-russian-and-chinese-firms-suspected-of-being-malign-actors-in-information-warfare/</a></p><p><a href="https://thecyberexpress.com/cybersecurity-investments-nis-report/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cybersecurity-investments-nis-report/</a></p><p><a href="https://therecord.media/california-man-pleads-guilty-rico-charges-crypto-theft" rel="noopener noreferrer" target="_blank">https://therecord.media/california-man-pleads-guilty-rico-charges-crypto-theft</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1025: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Warns of Critical Endpoint Manager Code Execution Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Seoul Cyber Investigators Seize Data from Korea Tech Giant</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Storm-0249 Escalates Ransomware Attacks with New Tactics</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-57-vulnerabilities-three-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-57-vulnerabilities-three-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-three-critical-vulnerabilities-across-multiple-products/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-three-critical-vulnerabilities-across-multiple-products/</a></p><p><a href="https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/</a></p><p><a href="https://therecord.media/seoul-cyber-investigators-seize-data-korea-tech-giant" rel="noopener noreferrer" target="_blank">https://therecord.media/seoul-cyber-investigators-seize-data-korea-tech-giant</a></p><p><a href="https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html</a></p><p><a href="https://thecyberexpress.com/australian-social-media-ban-takes-effect/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australian-social-media-ban-takes-effect/</a></p><p><a href="https://www.securityweek.com/uk-sanctions-russian-and-chinese-firms-suspected-of-being-malign-actors-in-information-warfare/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/uk-sanctions-russian-and-chinese-firms-suspected-of-being-malign-actors-in-information-warfare/</a></p><p><a href="https://thecyberexpress.com/cybersecurity-investments-nis-report/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cybersecurity-investments-nis-report/</a></p><p><a href="https://therecord.media/california-man-pleads-guilty-rico-charges-crypto-theft" rel="noopener noreferrer" target="_blank">https://therecord.media/california-man-pleads-guilty-rico-charges-crypto-theft</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7d17a69c-0b0c-47ad-932a-fcaf0e5cfd6f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 10 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7d17a69c-0b0c-47ad-932a-fcaf0e5cfd6f.mp3" length="8658668" type="audio/mpeg"/><itunes:duration>18:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1025</itunes:episode><podcast:episode>1025</podcast:episode></item><item><title>React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers</title><itunes:title>React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers</itunes:title><description><![CDATA[<p>🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1024: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Apache Tika Vulnerability Leads to XXE Injection Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AWS IAM Eventual Consistency Exploited in Security Bypass Technique</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attack</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/exploitation-of-react2shell-surges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-react2shell-surges/</a></p><p><a href="https://www.securityweek.com/ransomware-payments-surpassed-4-5-billion-us-treasury/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-payments-surpassed-4-5-billion-us-treasury/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/</a></p><p><a href="https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/</a></p><p><a href="https://cybersecuritynews.com/aws-iam-eventual-consistency-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/aws-iam-eventual-consistency-exploited/</a></p><p><a href="https://www.securityweek.com/google-fortifies-chrome-agentic-ai-against-indirect-prompt-injection-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-fortifies-chrome-agentic-ai-against-indirect-prompt-injection-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/poland-arrests-ukrainians-utilizing-advanced-hacking-equipment/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/poland-arrests-ukrainians-utilizing-advanced-hacking-equipment/</a></p><p><a href="https://therecord.media/trump-plans-ai-exec-order-curbing-state-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-plans-ai-exec-order-curbing-state-laws</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1024: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Apache Tika Vulnerability Leads to XXE Injection Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AWS IAM Eventual Consistency Exploited in Security Bypass Technique</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attack</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/exploitation-of-react2shell-surges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-react2shell-surges/</a></p><p><a href="https://www.securityweek.com/ransomware-payments-surpassed-4-5-billion-us-treasury/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-payments-surpassed-4-5-billion-us-treasury/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/</a></p><p><a href="https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/</a></p><p><a href="https://cybersecuritynews.com/aws-iam-eventual-consistency-exploited/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/aws-iam-eventual-consistency-exploited/</a></p><p><a href="https://www.securityweek.com/google-fortifies-chrome-agentic-ai-against-indirect-prompt-injection-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-fortifies-chrome-agentic-ai-against-indirect-prompt-injection-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/poland-arrests-ukrainians-utilizing-advanced-hacking-equipment/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/poland-arrests-ukrainians-utilizing-advanced-hacking-equipment/</a></p><p><a href="https://therecord.media/trump-plans-ai-exec-order-curbing-state-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-plans-ai-exec-order-curbing-state-laws</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ba94a598-4dca-4975-a975-cba01d8c0771</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 09 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ba94a598-4dca-4975-a975-cba01d8c0771.mp3" length="6720428" type="audio/mpeg"/><itunes:duration>14:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1024</itunes:episode><podcast:episode>1024</podcast:episode></item><item><title>US Organizations Warned of Chinese Malware Used for Long-Term Persistence, Critical React2Shell Flaw in React Next.js, New Wave of VPN Login Attempts Targets Palo Alto GlobalProtect Portals</title><itunes:title>US Organizations Warned of Chinese Malware Used for Long-Term Persistence, Critical React2Shell Flaw in React Next.js, New Wave of VPN Login Attempts Targets Palo Alto GlobalProtect Portals</itunes:title><description><![CDATA[<p>🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1023: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Researchers Uncover 30 Flaws in AI Code Assistants and Development Tools</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Zero-Click Agentic Browser Attack Can Compromise Systems Without User Interaction</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Outage Caused by React2Shell Mitigation Efforts</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/us-organizations-warned-of-chinese-malware-used-for-long-term-persistence/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-organizations-warned-of-chinese-malware-used-for-long-term-persistence/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-in-react-nextjs-lets-hackers-run-javascript-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-in-react-nextjs-lets-hackers-run-javascript-code/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/</a></p><p><a href="https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html</a></p><p><a href="https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html</a></p><p><a href="https://www.securityweek.com/cloudflare-outage-caused-by-react2shell-mitigations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-outage-caused-by-react2shell-mitigations/</a></p><p><a href="https://cybersecuritynews.com/lockbit-5-0-infrastructure-exposed/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lockbit-5-0-infrastructure-exposed/</a></p><p><a href="https://therecord.media/nato-holds-largest-ever-cyberdefense-exercise-estonia" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-holds-largest-ever-cyberdefense-exercise-estonia</a></p><p><a href="https://therecord.media/trump-national-security-strategy-cyber-elements" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-national-security-strategy-cyber-elements</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-virtual-kidnapping-ransom-scams-using-altered-social-media-photos/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-virtual-kidnapping-ransom-scams-using-altered-social-media-photos/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eu-fines-x-140-million-over-deceptive-blue-checkmarks-transparency-violations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eu-fines-x-140-million-over-deceptive-blue-checkmarks-transparency-violations/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1023: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Researchers Uncover 30 Flaws in AI Code Assistants and Development Tools</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Zero-Click Agentic Browser Attack Can Compromise Systems Without User Interaction</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Outage Caused by React2Shell Mitigation Efforts</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/us-organizations-warned-of-chinese-malware-used-for-long-term-persistence/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-organizations-warned-of-chinese-malware-used-for-long-term-persistence/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-in-react-nextjs-lets-hackers-run-javascript-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-in-react-nextjs-lets-hackers-run-javascript-code/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/</a></p><p><a href="https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html</a></p><p><a href="https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html</a></p><p><a href="https://www.securityweek.com/cloudflare-outage-caused-by-react2shell-mitigations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-outage-caused-by-react2shell-mitigations/</a></p><p><a href="https://cybersecuritynews.com/lockbit-5-0-infrastructure-exposed/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/lockbit-5-0-infrastructure-exposed/</a></p><p><a href="https://therecord.media/nato-holds-largest-ever-cyberdefense-exercise-estonia" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-holds-largest-ever-cyberdefense-exercise-estonia</a></p><p><a href="https://therecord.media/trump-national-security-strategy-cyber-elements" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-national-security-strategy-cyber-elements</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-virtual-kidnapping-ransom-scams-using-altered-social-media-photos/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-virtual-kidnapping-ransom-scams-using-altered-social-media-photos/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eu-fines-x-140-million-over-deceptive-blue-checkmarks-transparency-violations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eu-fines-x-140-million-over-deceptive-blue-checkmarks-transparency-violations/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1e88f811-6172-486b-8986-52c0778b0b7b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 08 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1e88f811-6172-486b-8986-52c0778b0b7b.mp3" length="7710572" type="audio/mpeg"/><itunes:duration>16:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1023</itunes:episode><podcast:episode>1023</podcast:episode></item><item><title>Marquis Data Breach Impacts Over 74 US Banks, Freedom Mobile Discloses Data Breach, Retail Giant Leroy Merlin Discloses Data Breach, Arizona Attorney General Sues Chinese Online Retailer Temu</title><itunes:title>Marquis Data Breach Impacts Over 74 US Banks, Freedom Mobile Discloses Data Breach, Retail Giant Leroy Merlin Discloses Data Breach, Arizona Attorney General Sues Chinese Online Retailer Temu</itunes:title><description><![CDATA[<p>🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1022: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillance Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Silently Mitigated Exploited LNK Vulnerability Without Public Notice</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Record Breaking 29.7 Tbps DDoS Attack Detected and Mitigated</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-data-breach-impacts-over-74-us-banks-credit-unions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-data-breach-impacts-over-74-us-banks-credit-unions/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/freedom-mobile-discloses-data-breach-exposing-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/freedom-mobile-discloses-data-breach-exposing-customer-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/</a></p><p><a href="https://therecord.media/askul-resumes-limited-ordering-following-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/askul-resumes-limited-ordering-following-ransomware-attack</a></p><p><a href="https://www.securityweek.com/arizona-attorney-general-sues-chinese-online-retailer-temu-over-data-theft-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/arizona-attorney-general-sues-chinese-online-retailer-temu-over-data-theft-claims/</a></p><p><a href="https://therecord.media/india-drops-mandate-sanchar-saathi-app-privacy-surveillance" rel="noopener noreferrer" target="_blank">https://therecord.media/india-drops-mandate-sanchar-saathi-app-privacy-surveillance</a></p><p><a href="https://www.securityweek.com/microsoft-silently-mitigated-exploited-lnk-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-silently-mitigated-exploited-lnk-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/29-7-tbps-ddos-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/29-7-tbps-ddos-attack/</a></p><p><a href="https://www.securityweek.com/chrome-143-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-143-patches-high-severity-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/hackers-can-weaponize-claude-skills/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-can-weaponize-claude-skills/</a></p><p><a href="https://thecyberexpress.com/wanted-iranian-cyber-operatives/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/wanted-iranian-cyber-operatives/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1022: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillance Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Silently Mitigated Exploited LNK Vulnerability Without Public Notice</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Record Breaking 29.7 Tbps DDoS Attack Detected and Mitigated</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/marquis-data-breach-impacts-over-74-us-banks-credit-unions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/marquis-data-breach-impacts-over-74-us-banks-credit-unions/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/freedom-mobile-discloses-data-breach-exposing-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/freedom-mobile-discloses-data-breach-exposing-customer-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/</a></p><p><a href="https://therecord.media/askul-resumes-limited-ordering-following-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/askul-resumes-limited-ordering-following-ransomware-attack</a></p><p><a href="https://www.securityweek.com/arizona-attorney-general-sues-chinese-online-retailer-temu-over-data-theft-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/arizona-attorney-general-sues-chinese-online-retailer-temu-over-data-theft-claims/</a></p><p><a href="https://therecord.media/india-drops-mandate-sanchar-saathi-app-privacy-surveillance" rel="noopener noreferrer" target="_blank">https://therecord.media/india-drops-mandate-sanchar-saathi-app-privacy-surveillance</a></p><p><a href="https://www.securityweek.com/microsoft-silently-mitigated-exploited-lnk-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-silently-mitigated-exploited-lnk-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/29-7-tbps-ddos-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/29-7-tbps-ddos-attack/</a></p><p><a href="https://www.securityweek.com/chrome-143-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-143-patches-high-severity-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/hackers-can-weaponize-claude-skills/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-can-weaponize-claude-skills/</a></p><p><a href="https://thecyberexpress.com/wanted-iranian-cyber-operatives/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/wanted-iranian-cyber-operatives/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e1ecb840-f767-4b49-a5f5-e1e2f26138f9</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 04 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e1ecb840-f767-4b49-a5f5-e1e2f26138f9.mp3" length="9012716" type="audio/mpeg"/><itunes:duration>18:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1022</itunes:episode><podcast:episode>1022</podcast:episode></item><item><title>North Korea Targets Crypto Exchange and IT Engineers, Penn Confirms Data Theft, Android Zero-Days Actively Exploited, 400K Secrets Exposed in Shai Hulud 2.0 Attack</title><itunes:title>North Korea Targets Crypto Exchange and IT Engineers, Penn Confirms Data Theft, Android Zero-Days Actively Exploited, 400K Secrets Exposed in Shai Hulud 2.0 Attack</itunes:title><description><![CDATA[<p>North Korea Hacks Crypto, Android Under Attack, 400K Dev Secrets Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1021: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android December patches two zero-days as CISA warns active exploitation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran targets Israel &amp; Egypt in phishing attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukrainian hackers hit Russian aerospace firms</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-theft-after-oracle-ebs-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-theft-after-oracle-ebs-hack/</a></p><p><a href="https://therecord.media/officials-accuse-north-korea-hackers-of-attack-on-crypto-exchange" rel="noopener noreferrer" target="_blank">https://therecord.media/officials-accuse-north-korea-hackers-of-attack-on-crypto-exchange</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/</a></p><p><a href="https://www.securityweek.com/androids-december-2025-updates-patch-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/androids-december-2025-updates-patch-two-zero-days/</a></p><p><a href="https://thecyberexpress.com/cisa-warns-android-vulnerabilities-attacked/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-warns-android-vulnerabilities-attacked/</a></p><p><a href="https://therecord.media/iran-linked-hackers-target-israel-egypt-phishing" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-linked-hackers-target-israel-egypt-phishing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/</a></p><p><a href="https://cybersecuritynews.com/ukraine-hackers-attacking-russian-aerospace-companies/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ukraine-hackers-attacking-russian-aerospace-companies/</a></p><p><a href="https://www.cybersecuritydive.com/news/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-fi/806791/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-fi/806791/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-calendly-invites-spoof-top-brands-to-hijack-ad-manager-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-calendly-invites-spoof-top-brands-to-hijack-ad-manager-accounts/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>North Korea Hacks Crypto, Android Under Attack, 400K Dev Secrets Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1021: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android December patches two zero-days as CISA warns active exploitation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran targets Israel &amp; Egypt in phishing attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukrainian hackers hit Russian aerospace firms</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-theft-after-oracle-ebs-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-theft-after-oracle-ebs-hack/</a></p><p><a href="https://therecord.media/officials-accuse-north-korea-hackers-of-attack-on-crypto-exchange" rel="noopener noreferrer" target="_blank">https://therecord.media/officials-accuse-north-korea-hackers-of-attack-on-crypto-exchange</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets/</a></p><p><a href="https://www.securityweek.com/androids-december-2025-updates-patch-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/androids-december-2025-updates-patch-two-zero-days/</a></p><p><a href="https://thecyberexpress.com/cisa-warns-android-vulnerabilities-attacked/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-warns-android-vulnerabilities-attacked/</a></p><p><a href="https://therecord.media/iran-linked-hackers-target-israel-egypt-phishing" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-linked-hackers-target-israel-egypt-phishing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/</a></p><p><a href="https://cybersecuritynews.com/ukraine-hackers-attacking-russian-aerospace-companies/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ukraine-hackers-attacking-russian-aerospace-companies/</a></p><p><a href="https://www.cybersecuritydive.com/news/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-fi/806791/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-fi/806791/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-calendly-invites-spoof-top-brands-to-hijack-ad-manager-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-calendly-invites-spoof-top-brands-to-hijack-ad-manager-accounts/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">95ee82d4-d1e7-49d1-947c-d6d4da362665</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 03 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/95ee82d4-d1e7-49d1-947c-d6d4da362665.mp3" length="8200556" type="audio/mpeg"/><itunes:duration>17:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1021</itunes:episode><podcast:episode>1021</podcast:episode></item><item><title>Coupang Data Breach Impacts 33.7 Million People, AI Malware Campaigns Return, $29 Million in Crypto Seized in Takedown, India Mandates Cybersecurity App, &amp; Chinese Front Companies Exposed in Espionage Operations</title><itunes:title>Coupang Data Breach Impacts 33.7 Million People, AI Malware Campaigns Return, $29 Million in Crypto Seized in Takedown, India Mandates Cybersecurity App, &amp; Chinese Front Companies Exposed in Espionage Operations</itunes:title><description><![CDATA[<p>🎙️ Coupang 33.7M Data Breach, AI Malware Returns, Crypto Seized &amp; China Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1020: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$29 million Bitcoin seized in crypto-mixer operation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;India launches national cybersecurity app initiative</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia imposes new restrictions on WhatsApp usage</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-coupang-suffers-data-breach-impacting-337-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-coupang-suffers-data-breach-impacting-337-million-people/</a></p><p><a href="https://thecyberexpress.com/airbus-a320-software-recall-retrofit/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/airbus-a320-software-recall-retrofit/</a></p><p><a href="https://therecord.media/illuminate-education-data-breach-settlement-ftc" rel="noopener noreferrer" target="_blank">https://therecord.media/illuminate-education-data-breach-settlement-ftc</a></p><p><a href="https://www.securityweek.com/29-million-worth-of-bitcoin-seized-in-cryptomixer-takedown/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/29-million-worth-of-bitcoin-seized-in-cryptomixer-takedown/</a></p><p><a href="https://cybersecuritynews.com/india-mandates-cybersecurity-app/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/india-mandates-cybersecurity-app/</a></p><p><a href="https://therecord.media/russia-whatsapp-restrictions" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-whatsapp-restrictions</a></p><p><a href="https://cybersecuritynews.com/chinese-front-companies/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chinese-front-companies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-in-third-wave-of-malicious-vs-code-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-in-third-wave-of-malicious-vs-code-packages/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shadypanda-browser-extensions-amass-43m-installs-in-malicious-campaign/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shadypanda-browser-extensions-amass-43m-installs-in-malicious-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/hackers-threat-campaign-zendesk-environments/806666/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/hackers-threat-campaign-zendesk-environments/806666/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Coupang 33.7M Data Breach, AI Malware Returns, Crypto Seized &amp; China Exposed</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1020: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$29 million Bitcoin seized in crypto-mixer operation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;India launches national cybersecurity app initiative</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia imposes new restrictions on WhatsApp usage</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-coupang-suffers-data-breach-impacting-337-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-coupang-suffers-data-breach-impacting-337-million-people/</a></p><p><a href="https://thecyberexpress.com/airbus-a320-software-recall-retrofit/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/airbus-a320-software-recall-retrofit/</a></p><p><a href="https://therecord.media/illuminate-education-data-breach-settlement-ftc" rel="noopener noreferrer" target="_blank">https://therecord.media/illuminate-education-data-breach-settlement-ftc</a></p><p><a href="https://www.securityweek.com/29-million-worth-of-bitcoin-seized-in-cryptomixer-takedown/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/29-million-worth-of-bitcoin-seized-in-cryptomixer-takedown/</a></p><p><a href="https://cybersecuritynews.com/india-mandates-cybersecurity-app/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/india-mandates-cybersecurity-app/</a></p><p><a href="https://therecord.media/russia-whatsapp-restrictions" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-whatsapp-restrictions</a></p><p><a href="https://cybersecuritynews.com/chinese-front-companies/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chinese-front-companies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-in-third-wave-of-malicious-vs-code-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-in-third-wave-of-malicious-vs-code-packages/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shadypanda-browser-extensions-amass-43m-installs-in-malicious-campaign/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shadypanda-browser-extensions-amass-43m-installs-in-malicious-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/hackers-threat-campaign-zendesk-environments/806666/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/hackers-threat-campaign-zendesk-environments/806666/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">85d262a1-0db2-46f1-a434-2300d40c0d5f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 02 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/85d262a1-0db2-46f1-a434-2300d40c0d5f.mp3" length="8360876" type="audio/mpeg"/><itunes:duration>17:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1020</itunes:episode><podcast:episode>1020</podcast:episode></item><item><title>OpenAI User Data Exposed in Mixpanel Hack, French Soccer Federation Hit by Major Breaches, Comcast Fined $15M After Vendor Leak, Weaponized Google Meet Malware Spreads</title><itunes:title>OpenAI User Data Exposed in Mixpanel Hack, French Soccer Federation Hit by Major Breaches, Comcast Fined $15M After Vendor Leak, Weaponized Google Meet Malware Spreads</itunes:title><description><![CDATA[<p>AI Platforms Hacked, French Soccer &amp; Asahi Breaches, Comcast Fined $15M 💥</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p><br></p><p>Ep – 1019: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Gainsight warns of exposed Salesforce application data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Weaponized Google Meet campaign spreads ClickFix malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17,000 secrets leaked from public GitLab repositories</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/french-soccer-federation-hit-by-cyberattack-member-data-stolen/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/french-soccer-federation-hit-by-cyberattack-member-data-stolen/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/japanese-beer-giant-asahi-says-data-breach-hit-15-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/japanese-beer-giant-asahi-says-data-breach-hit-15-million-people/</a></p><p><a href="https://www.cybersecuritydive.com/news/gainsight-applications-hold-salesforce/806277/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/gainsight-applications-hold-salesforce/806277/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/</a></p><p><a href="https://thecyberexpress.com/french-regulator-fines-vanity-fair/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/french-regulator-fines-vanity-fair/</a></p><p><a href="https://www.securityweek.com/openai-user-data-exposed-in-mixpanel-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-user-data-exposed-in-mixpanel-hack/</a></p><p><a href="https://www.cybersecuritydive.com/news/factory-disrupts-campaign-AI-development-platform/806180/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/factory-disrupts-campaign-AI-development-platform/806180/</a></p><p><a href="https://cybersecuritynews.com/weaponized-google-meet-clickfix/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/weaponized-google-meet-clickfix/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/</a></p><p><a href="https://thehackernews.com/2025/11/cisa-adds-actively-exploited-xss-bug.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/cisa-adds-actively-exploited-xss-bug.html</a></p><p><a href="https://therecord.media/california-web-browser-law-national-implications" rel="noopener noreferrer" target="_blank">https://therecord.media/california-web-browser-law-national-implications</a></p><p><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>AI Platforms Hacked, French Soccer &amp; Asahi Breaches, Comcast Fined $15M 💥</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p><br></p><p>Ep – 1019: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Gainsight warns of exposed Salesforce application data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Weaponized Google Meet campaign spreads ClickFix malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;17,000 secrets leaked from public GitLab repositories</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/french-soccer-federation-hit-by-cyberattack-member-data-stolen/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/french-soccer-federation-hit-by-cyberattack-member-data-stolen/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/japanese-beer-giant-asahi-says-data-breach-hit-15-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/japanese-beer-giant-asahi-says-data-breach-hit-15-million-people/</a></p><p><a href="https://www.cybersecuritydive.com/news/gainsight-applications-hold-salesforce/806277/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/gainsight-applications-hold-salesforce/806277/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/</a></p><p><a href="https://thecyberexpress.com/french-regulator-fines-vanity-fair/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/french-regulator-fines-vanity-fair/</a></p><p><a href="https://www.securityweek.com/openai-user-data-exposed-in-mixpanel-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-user-data-exposed-in-mixpanel-hack/</a></p><p><a href="https://www.cybersecuritydive.com/news/factory-disrupts-campaign-AI-development-platform/806180/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/factory-disrupts-campaign-AI-development-platform/806180/</a></p><p><a href="https://cybersecuritynews.com/weaponized-google-meet-clickfix/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/weaponized-google-meet-clickfix/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/</a></p><p><a href="https://thehackernews.com/2025/11/cisa-adds-actively-exploited-xss-bug.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/cisa-adds-actively-exploited-xss-bug.html</a></p><p><a href="https://therecord.media/california-web-browser-law-national-implications" rel="noopener noreferrer" target="_blank">https://therecord.media/california-web-browser-law-national-implications</a></p><p><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">63db5bb8-ff6e-4129-8d4f-80876b2e614d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 01 Dec 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/63db5bb8-ff6e-4129-8d4f-80876b2e614d.mp3" length="9286700" type="audio/mpeg"/><itunes:duration>19:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1019</itunes:episode><podcast:episode>1019</podcast:episode></item><item><title>Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert</title><itunes:title>Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert</itunes:title><description><![CDATA[<p>🎙️ Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1018: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attack Uses Fake Windows Update Screen to Push Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fluent Bit Vulnerabilities Expose Cloud Services to Takeover Risks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Spyware Targeting Messaging App Users in Active Campaigns</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/</a></p><p><a href="https://therecord.media/georgia-court-filing-org-ransomware-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/georgia-court-filing-org-ransomware-warning</a></p><p><a href="https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/</a></p><p><a href="https://www.securityweek.com/russian-hackers-target-us-engineering-firm-because-of-work-done-for-ukrainian-sister-city/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-target-us-engineering-firm-because-of-work-done-for-ukrainian-sister-city/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/</a></p><p><a href="https://www.securityweek.com/fluent-bit-vulnerabilities-expose-cloud-services-to-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fluent-bit-vulnerabilities-expose-cloud-services-to-takeover/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-spyware-targeting-messaging-app-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-spyware-targeting-messaging-app-users/</a></p><p><a href="https://therecord.media/russia-arrests-tech-entrepreneur-treason" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-arrests-tech-entrepreneur-treason</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1018: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attack Uses Fake Windows Update Screen to Push Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fluent Bit Vulnerabilities Expose Cloud Services to Takeover Risks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Spyware Targeting Messaging App Users in Active Campaigns</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/</a></p><p><a href="https://therecord.media/georgia-court-filing-org-ransomware-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/georgia-court-filing-org-ransomware-warning</a></p><p><a href="https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-cybercriminals-stole-262-million-by-impersonating-bank-support-teams-since-january/</a></p><p><a href="https://www.securityweek.com/russian-hackers-target-us-engineering-firm-because-of-work-done-for-ukrainian-sister-city/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-target-us-engineering-firm-because-of-work-done-for-ukrainian-sister-city/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/</a></p><p><a href="https://www.securityweek.com/fluent-bit-vulnerabilities-expose-cloud-services-to-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fluent-bit-vulnerabilities-expose-cloud-services-to-takeover/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-spyware-targeting-messaging-app-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-spyware-targeting-messaging-app-users/</a></p><p><a href="https://therecord.media/russia-arrests-tech-entrepreneur-treason" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-arrests-tech-entrepreneur-treason</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">76809883-8bf2-4b93-8d23-c9220a917c3c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 26 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/76809883-8bf2-4b93-8d23-c9220a917c3c.mp3" length="8074604" type="audio/mpeg"/><itunes:duration>16:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1018</itunes:episode><podcast:episode>1018</podcast:episode></item><item><title>Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties</title><itunes:title>Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties</itunes:title><description><![CDATA[<p>🎙️ Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1017: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Knock Out Systems at Russia Operated Post in Ukraine</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 600 NPM Packages Leak Secrets on GitHub in Supply Chain Risk</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cybersecurity PoC Released for W3 Total Cache Vulnerability</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/</a></p><p><a href="https://www.securityweek.com/mazda-says-no-data-leakage-or-operational-impact-from-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mazda-says-no-data-leakage-or-operational-impact-from-oracle-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/</a></p><p><a href="https://therecord.media/hackers-knock-out-systems-russia-operated-post-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-knock-out-systems-russia-operated-post-ukraine</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/</a></p><p><a href="https://cybersecuritynews.com/poc-released-for-w3-total-cache-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/poc-released-for-w3-total-cache-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/hackers-leveraging-whatsapp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-leveraging-whatsapp/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/</a></p><p><a href="https://cybersecuritynews.com/apt35-hacker-groups-internal-documents/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/apt35-hacker-groups-internal-documents/</a></p><p><a href="https://therecord.media/software-companies-liable-britain-security" rel="noopener noreferrer" target="_blank">https://therecord.media/software-companies-liable-britain-security</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1017: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Knock Out Systems at Russia Operated Post in Ukraine</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 600 NPM Packages Leak Secrets on GitHub in Supply Chain Risk</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cybersecurity PoC Released for W3 Total Cache Vulnerability</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/</a></p><p><a href="https://www.securityweek.com/mazda-says-no-data-leakage-or-operational-impact-from-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mazda-says-no-data-leakage-or-operational-impact-from-oracle-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/</a></p><p><a href="https://therecord.media/hackers-knock-out-systems-russia-operated-post-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-knock-out-systems-russia-operated-post-ukraine</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/</a></p><p><a href="https://cybersecuritynews.com/poc-released-for-w3-total-cache-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/poc-released-for-w3-total-cache-vulnerability/</a></p><p><a href="https://cybersecuritynews.com/hackers-leveraging-whatsapp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-leveraging-whatsapp/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/</a></p><p><a href="https://cybersecuritynews.com/apt35-hacker-groups-internal-documents/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/apt35-hacker-groups-internal-documents/</a></p><p><a href="https://therecord.media/software-companies-liable-britain-security" rel="noopener noreferrer" target="_blank">https://therecord.media/software-companies-liable-britain-security</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d2ddca70-ab57-47ba-8936-365f94160aae</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 25 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d2ddca70-ab57-47ba-8936-365f94160aae.mp3" length="7958828" type="audio/mpeg"/><itunes:duration>16:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1017</itunes:episode><podcast:episode>1017</podcast:episode></item><item><title>Iberia Discloses Customer Data Leak After Breach, CrowdStrike Catches Insider Feeding Threat Intelligence, Oracle Identity Manager Flaw  Exploited as Zero-Day, Grafana SSIM Flaw</title><itunes:title>Iberia Discloses Customer Data Leak After Breach, CrowdStrike Catches Insider Feeding Threat Intelligence, Oracle Identity Manager Flaw  Exploited as Zero-Day, Grafana SSIM Flaw</itunes:title><description><![CDATA[<p>🎙️ Iberia Customer Data Leak After Vendor Breach, CrowdStrike Insider Feeding, Oracle Identity Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1016: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cleveland County Oklahoma Attleboro Mass Law Enforcement Hit by Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Deluxe Enterprises Discloses Oracle E-Business Suite Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salesforce Cuts Off Access to Third-Party Unusual Activity Detection</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/</a></p><p><a href="https://therecord.media/cleveland-county-okla-attleboro-mass-law-enforcement-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/cleveland-county-okla-attleboro-mass-law-enforcement-cyberattacks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/</a></p><p><a href="https://therecord.media/salesforce-cuts-off-access-to-third-party-unusual-activity" rel="noopener noreferrer" target="_blank">https://therecord.media/salesforce-cuts-off-access-to-third-party-unusual-activity</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/</a></p><p><a href="https://therecord.media/russia-report-apt31-china-linked-hacks" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-report-apt31-china-linked-hacks</a></p><p><a href="https://www.securityweek.com/squarex-and-perplexity-quarrel-over-alleged-comet-browser-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/squarex-and-perplexity-quarrel-over-alleged-comet-browser-vulnerability/</a></p><p><a href="https://www.securityweek.com/critical-oracle-identity-manager-flaw-possibly-exploited-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-oracle-identity-manager-flaw-possibly-exploited-as-zero-day/</a></p><p><a href="https://cybersecuritynews.com/azure-bastion-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/azure-bastion-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html</a></p><p><a href="https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Iberia Customer Data Leak After Vendor Breach, CrowdStrike Insider Feeding, Oracle Identity Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1016: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cleveland County Oklahoma Attleboro Mass Law Enforcement Hit by Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Deluxe Enterprises Discloses Oracle E-Business Suite Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salesforce Cuts Off Access to Third-Party Unusual Activity Detection</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/</a></p><p><a href="https://therecord.media/cleveland-county-okla-attleboro-mass-law-enforcement-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/cleveland-county-okla-attleboro-mass-law-enforcement-cyberattacks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/</a></p><p><a href="https://therecord.media/salesforce-cuts-off-access-to-third-party-unusual-activity" rel="noopener noreferrer" target="_blank">https://therecord.media/salesforce-cuts-off-access-to-third-party-unusual-activity</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/</a></p><p><a href="https://therecord.media/russia-report-apt31-china-linked-hacks" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-report-apt31-china-linked-hacks</a></p><p><a href="https://www.securityweek.com/squarex-and-perplexity-quarrel-over-alleged-comet-browser-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/squarex-and-perplexity-quarrel-over-alleged-comet-browser-vulnerability/</a></p><p><a href="https://www.securityweek.com/critical-oracle-identity-manager-flaw-possibly-exploited-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-oracle-identity-manager-flaw-possibly-exploited-as-zero-day/</a></p><p><a href="https://cybersecuritynews.com/azure-bastion-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/azure-bastion-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html</a></p><p><a href="https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7834e3a3-c38a-4e7e-8531-0b16f01d5803</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 24 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7834e3a3-c38a-4e7e-8531-0b16f01d5803.mp3" length="8210732" type="audio/mpeg"/><itunes:duration>17:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1016</itunes:episode><podcast:episode>1016</podcast:episode></item><item><title>Russia VAK Cyberattack Causes Widespread Outages, Amazon Details Iran Cyber-Enabled Kinetic Attacks Linking Digital Spying, Bulletproof Hosting Service Harbors Ransomware as a Service</title><itunes:title>Russia VAK Cyberattack Causes Widespread Outages, Amazon Details Iran Cyber-Enabled Kinetic Attacks Linking Digital Spying, Bulletproof Hosting Service Harbors Ransomware as a Service</itunes:title><description><![CDATA[<p>🎙️ Russia VAK Cyberattack Outages, Amazon Iran Cyber-Enabled Kinetic Attacks, Bulletproof Hosting</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1015: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Aligned Threat Actor Espionage Network Targets Devices Globally</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Major Security Firm Shiraz Cloud Announces Ransomware as a Service Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Asus Routers Hacked in Wrthug Campaign Affecting 30,064 Devices</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/russia-vsk-cyberattack-outages" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-vsk-cyberattack-outages</a></p><p><a href="https://therecord.media/bulletproof-hosting-sanctions-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/bulletproof-hosting-sanctions-ransomware</a></p><p><a href="https://www.securityweek.com/amazon-details-irans-cyber-enabled-kinetic-attacks-linking-digital-spying-to-physical-strikes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amazon-details-irans-cyber-enabled-kinetic-attacks-linking-digital-spying-to-physical-strikes/</a></p><p><a href="https://therecord.media/china-aligned-threat-actor-espionage-network-devices" rel="noopener noreferrer" target="_blank">https://therecord.media/china-aligned-threat-actor-espionage-network-devices</a></p><p><a href="https://www.bleepingcomputer.com/news/security/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/</a></p><p><a href="https://www.bankinfosecurity.com/asus-routers-hacked-in-wrthug-campaign-a-30064" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/asus-routers-hacked-in-wrthug-campaign-a-30064</a></p><p><a href="https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-the-browser-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-the-browser-attack/</a></p><p><a href="https://therecord.media/international-operation-traces-millions-crypto-streaming-piracy" rel="noopener noreferrer" target="_blank">https://therecord.media/international-operation-traces-millions-crypto-streaming-piracy</a></p><p><a href="https://www.bleepingcomputer.com/news/security/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/</a></p><p><a href="https://therecord.media/lawmakers-bill-beefs-security-sec" rel="noopener noreferrer" target="_blank">https://therecord.media/lawmakers-bill-beefs-security-sec</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Russia VAK Cyberattack Outages, Amazon Iran Cyber-Enabled Kinetic Attacks, Bulletproof Hosting</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1015: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Aligned Threat Actor Espionage Network Targets Devices Globally</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Major Security Firm Shiraz Cloud Announces Ransomware as a Service Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Asus Routers Hacked in Wrthug Campaign Affecting 30,064 Devices</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/russia-vsk-cyberattack-outages" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-vsk-cyberattack-outages</a></p><p><a href="https://therecord.media/bulletproof-hosting-sanctions-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/bulletproof-hosting-sanctions-ransomware</a></p><p><a href="https://www.securityweek.com/amazon-details-irans-cyber-enabled-kinetic-attacks-linking-digital-spying-to-physical-strikes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amazon-details-irans-cyber-enabled-kinetic-attacks-linking-digital-spying-to-physical-strikes/</a></p><p><a href="https://therecord.media/china-aligned-threat-actor-espionage-network-devices" rel="noopener noreferrer" target="_blank">https://therecord.media/china-aligned-threat-actor-espionage-network-devices</a></p><p><a href="https://www.bleepingcomputer.com/news/security/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/</a></p><p><a href="https://www.bankinfosecurity.com/asus-routers-hacked-in-wrthug-campaign-a-30064" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/asus-routers-hacked-in-wrthug-campaign-a-30064</a></p><p><a href="https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-the-browser-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-the-browser-attack/</a></p><p><a href="https://therecord.media/international-operation-traces-millions-crypto-streaming-piracy" rel="noopener noreferrer" target="_blank">https://therecord.media/international-operation-traces-millions-crypto-streaming-piracy</a></p><p><a href="https://www.bleepingcomputer.com/news/security/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/california-man-admits-to-laundering-crypto-stolen-in-230m-heist/</a></p><p><a href="https://therecord.media/lawmakers-bill-beefs-security-sec" rel="noopener noreferrer" target="_blank">https://therecord.media/lawmakers-bill-beefs-security-sec</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">42a15dcf-81c7-423b-b25c-65da126a4a48</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 20 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/42a15dcf-81c7-423b-b25c-65da126a4a48.mp3" length="7936172" type="audio/mpeg"/><itunes:duration>16:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1015</itunes:episode><podcast:episode>1015</podcast:episode></item><item><title>LG Energy Solution Ransomware Incident Hits Battery Maker Operations, Malware Backdoors Linked to Iran Affecting 30K Devices, Congressional Budget Office Director Testifies Hackers Expelled Swiftly</title><itunes:title>LG Energy Solution Ransomware Incident Hits Battery Maker Operations, Malware Backdoors Linked to Iran Affecting 30K Devices, Congressional Budget Office Director Testifies Hackers Expelled Swiftly</itunes:title><description><![CDATA[<p>🎙️ Major Battery Maker Ransomware, Iran Backdoors 30K Systems, Crypto Mining Ray Attack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1014: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Security Community Aims to Reach Chinese Hackers via LinkedIn for Dialogue</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Congressional Budget Office Director Testifies Hackers Expelled from Systems Swiftly</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Says Highly Disruptive Outage Not Caused by Cyberattack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/lg-energy-solution-ransomware-incident-battery-maker" rel="noopener noreferrer" target="_blank">https://therecord.media/lg-energy-solution-ransomware-incident-battery-maker</a></p><p><a href="https://www.securityweek.com/mi5-warns-lawmakers-that-chinese-spies-are-trying-to-reach-them-via-linkedin/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mi5-warns-lawmakers-that-chinese-spies-are-trying-to-reach-them-via-linkedin/</a></p><p><a href="https://therecord.media/congressional-budget-office-director-testifies-hackers-expelled" rel="noopener noreferrer" target="_blank">https://therecord.media/congressional-budget-office-director-testifies-hackers-expelled</a></p><p><a href="https://www.bankinfosecurity.com/google-finds-new-malware-backdoors-linked-to-iran-a-30063" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/google-finds-new-malware-backdoors-linked-to-iran-a-30063</a></p><p><a href="https://therecord.media/national-cyber-strategy-cairncross-shaping-enemy-behavior" rel="noopener noreferrer" target="_blank">https://therecord.media/national-cyber-strategy-cairncross-shaping-enemy-behavior</a></p><p><a href="https://www.securityweek.com/cloudflare-says-highly-disruptive-outage-not-caused-by-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-says-highly-disruptive-outage-not-caused-by-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-shadowray-attacks-convert-ray-clusters-into-crypto-miners/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-shadowray-attacks-convert-ray-clusters-into-crypto-miners/</a></p><p><a href="https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html</a></p><p><a href="https://therecord.media/russian-arrested-thailand-allegedly-void-blizzard-apt-member" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-arrested-thailand-allegedly-void-blizzard-apt-member</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Major Battery Maker Ransomware, Iran Backdoors 30K Systems, Crypto Mining Ray Attack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1014: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Security Community Aims to Reach Chinese Hackers via LinkedIn for Dialogue</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Congressional Budget Office Director Testifies Hackers Expelled from Systems Swiftly</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Says Highly Disruptive Outage Not Caused by Cyberattack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/lg-energy-solution-ransomware-incident-battery-maker" rel="noopener noreferrer" target="_blank">https://therecord.media/lg-energy-solution-ransomware-incident-battery-maker</a></p><p><a href="https://www.securityweek.com/mi5-warns-lawmakers-that-chinese-spies-are-trying-to-reach-them-via-linkedin/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mi5-warns-lawmakers-that-chinese-spies-are-trying-to-reach-them-via-linkedin/</a></p><p><a href="https://therecord.media/congressional-budget-office-director-testifies-hackers-expelled" rel="noopener noreferrer" target="_blank">https://therecord.media/congressional-budget-office-director-testifies-hackers-expelled</a></p><p><a href="https://www.bankinfosecurity.com/google-finds-new-malware-backdoors-linked-to-iran-a-30063" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/google-finds-new-malware-backdoors-linked-to-iran-a-30063</a></p><p><a href="https://therecord.media/national-cyber-strategy-cairncross-shaping-enemy-behavior" rel="noopener noreferrer" target="_blank">https://therecord.media/national-cyber-strategy-cairncross-shaping-enemy-behavior</a></p><p><a href="https://www.securityweek.com/cloudflare-says-highly-disruptive-outage-not-caused-by-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-says-highly-disruptive-outage-not-caused-by-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortiweb-zero-day-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-shadowray-attacks-convert-ray-clusters-into-crypto-miners/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-shadowray-attacks-convert-ray-clusters-into-crypto-miners/</a></p><p><a href="https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html</a></p><p><a href="https://therecord.media/russian-arrested-thailand-allegedly-void-blizzard-apt-member" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-arrested-thailand-allegedly-void-blizzard-apt-member</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0eca1a70-10c2-4c61-b578-960904391ca6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 19 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0eca1a70-10c2-4c61-b578-960904391ca6.mp3" length="7514156" type="audio/mpeg"/><itunes:duration>15:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1014</itunes:episode><podcast:episode>1014</podcast:episode></item><item><title>DoorDash Says Personal Information Stolen in Data Breach, PA AG Office Data Breach Sends Notifications, Eurofiber France Warns of Breach, Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Campaigns</title><itunes:title>DoorDash Says Personal Information Stolen in Data Breach, PA AG Office Data Breach Sends Notifications, Eurofiber France Warns of Breach, Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Campaigns</itunes:title><description><![CDATA[<p>🎙️ DoorDash Personal Info Stolen | Penn AG Office Breach | Microsoft Aisuru Botnet 500K IPs | Chrome Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1013: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target Defense and Government Officials in LinkedIn Campaigns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Attack Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;IBM AIX Critical Vulnerabilities Discovered Requiring Immediate Patching</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/doordash-says-personal-information-stolen-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/doordash-says-personal-information-stolen-in-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/</a></p><p><a href="https://therecord.media/pennsylvania-attorney-general-office-data-breach-ssns" rel="noopener noreferrer" target="_blank">https://therecord.media/pennsylvania-attorney-general-office-data-breach-ssns</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/</a></p><p><a href="https://www.securityweek.com/iranian-hackers-target-defense-and-government-officials-in-ongoing-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-target-defense-and-government-officials-in-ongoing-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/</a></p><p><a href="https://thecyberexpress.com/ibm-aix-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ibm-aix-critical-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/chrome-type-confusion-zero-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-type-confusion-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rondodox-botnet-malware-now-hacks-servers-using-xwiki-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rondodox-botnet-malware-now-hacks-servers-using-xwiki-flaw/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ DoorDash Personal Info Stolen | Penn AG Office Breach | Microsoft Aisuru Botnet 500K IPs | Chrome Zero-Day</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1013: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target Defense and Government Officials in LinkedIn Campaigns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Attack Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;IBM AIX Critical Vulnerabilities Discovered Requiring Immediate Patching</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/doordash-says-personal-information-stolen-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/doordash-says-personal-information-stolen-in-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/</a></p><p><a href="https://therecord.media/pennsylvania-attorney-general-office-data-breach-ssns" rel="noopener noreferrer" target="_blank">https://therecord.media/pennsylvania-attorney-general-office-data-breach-ssns</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/</a></p><p><a href="https://www.securityweek.com/iranian-hackers-target-defense-and-government-officials-in-ongoing-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-target-defense-and-government-officials-in-ongoing-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/</a></p><p><a href="https://thecyberexpress.com/ibm-aix-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ibm-aix-critical-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/chrome-type-confusion-zero-day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-type-confusion-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rondodox-botnet-malware-now-hacks-servers-using-xwiki-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rondodox-botnet-malware-now-hacks-servers-using-xwiki-flaw/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">df96be17-2429-4113-9b77-b114762053eb</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 18 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/df96be17-2429-4113-9b77-b114762053eb.mp3" length="5373356" type="audio/mpeg"/><itunes:duration>11:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1013</itunes:episode><podcast:episode>1013</podcast:episode></item><item><title>Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign, Checkout.com Discloses Data Breach, WaPo Says Nearly 10K Employees Impacted by Hack, JLR Breach Cost $220M</title><itunes:title>Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign, Checkout.com Discloses Data Breach, WaPo Says Nearly 10K Employees Impacted by Hack, JLR Breach Cost $220M</itunes:title><description><![CDATA[<p>🎙️ Anthropic Claude AI Powered 90% Chinese Espionage, Checkout.com Breach, WaPo 10K Oracle Hack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1012: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jaguar Land Rover Cyberattack Cost the Company Over $220 Million</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Akira Ransomware Group Made $244 Million in Ransom Proceeds</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Danish Government Sites Disrupts Critical Services</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/anthropic-says-claude-ai-powered-90-of-chinese-espionage-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/anthropic-says-claude-ai-powered-90-of-chinese-espionage-campaign/</a></p><p><a href="https://www.securityweek.com/checkout-com-discloses-data-breach-after-extortion-attempt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/checkout-com-discloses-data-breach-after-extortion-attempt/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/</a></p><p><a href="https://www.securityweek.com/washington-post-says-nearly-10000-employees-impacted-by-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-post-says-nearly-10000-employees-impacted-by-oracle-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/</a></p><p><a href="https://www.securityweek.com/akira-ransomware-group-made-244-million-in-ransom-proceeds/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/akira-ransomware-group-made-244-million-in-ransom-proceeds/</a></p><p><a href="https://thecyberexpress.com/cyberattack-on-danish-government-sites/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cyberattack-on-danish-government-sites/</a></p><p><a href="https://www.securityweek.com/fortinet-confirms-active-exploitation-of-critical-fortiweb-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-confirms-active-exploitation-of-critical-fortiweb-vulnerability/</a></p><p><a href="https://www.securityweek.com/amazon-detects-150000-npm-packages-in-worm-powered-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amazon-detects-150000-npm-packages-in-worm-powered-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/operation-endgame-third-phase-infostealer-rat-botnet/805549/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/operation-endgame-third-phase-infostealer-rat-botnet/805549/</a></p><p><a href="https://www.securityweek.com/cybercom-2-0-pentagon-unveils-plan-to-fix-cyber-talent-shortfalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybercom-2-0-pentagon-unveils-plan-to-fix-cyber-talent-shortfalls/</a></p><p><a href="https://therecord.media/russian-hacker-detained-thailand-possible-us-extradition" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hacker-detained-thailand-possible-us-extradition</a></p><p><a href="https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Anthropic Claude AI Powered 90% Chinese Espionage, Checkout.com Breach, WaPo 10K Oracle Hack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1012: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jaguar Land Rover Cyberattack Cost the Company Over $220 Million</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Akira Ransomware Group Made $244 Million in Ransom Proceeds</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Danish Government Sites Disrupts Critical Services</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/anthropic-says-claude-ai-powered-90-of-chinese-espionage-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/anthropic-says-claude-ai-powered-90-of-chinese-espionage-campaign/</a></p><p><a href="https://www.securityweek.com/checkout-com-discloses-data-breach-after-extortion-attempt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/checkout-com-discloses-data-breach-after-extortion-attempt/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/</a></p><p><a href="https://www.securityweek.com/washington-post-says-nearly-10000-employees-impacted-by-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-post-says-nearly-10000-employees-impacted-by-oracle-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/</a></p><p><a href="https://www.securityweek.com/akira-ransomware-group-made-244-million-in-ransom-proceeds/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/akira-ransomware-group-made-244-million-in-ransom-proceeds/</a></p><p><a href="https://thecyberexpress.com/cyberattack-on-danish-government-sites/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cyberattack-on-danish-government-sites/</a></p><p><a href="https://www.securityweek.com/fortinet-confirms-active-exploitation-of-critical-fortiweb-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-confirms-active-exploitation-of-critical-fortiweb-vulnerability/</a></p><p><a href="https://www.securityweek.com/amazon-detects-150000-npm-packages-in-worm-powered-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amazon-detects-150000-npm-packages-in-worm-powered-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/operation-endgame-third-phase-infostealer-rat-botnet/805549/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/operation-endgame-third-phase-infostealer-rat-botnet/805549/</a></p><p><a href="https://www.securityweek.com/cybercom-2-0-pentagon-unveils-plan-to-fix-cyber-talent-shortfalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybercom-2-0-pentagon-unveils-plan-to-fix-cyber-talent-shortfalls/</a></p><p><a href="https://therecord.media/russian-hacker-detained-thailand-possible-us-extradition" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hacker-detained-thailand-possible-us-extradition</a></p><p><a href="https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">eb1fd095-54bb-49e1-81ab-adadc109ee2b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 17 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/eb1fd095-54bb-49e1-81ab-adadc109ee2b.mp3" length="9120428" type="audio/mpeg"/><itunes:duration>19:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1012</itunes:episode><podcast:episode>1012</podcast:episode></item><item><title>Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws</title><itunes:title>Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws</itunes:title><description><![CDATA[<p>🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1011: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Court Order Sparks NYT Copyright Dispute Over AI Training Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmunk Citrix NetScaler ADC and Gateway Vulnerability Patched</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched by Ivanti and Zoom Products</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/</a></p><p><a href="https://thecyberexpress.com/china-cyberattack-accusation/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/china-cyberattack-accusation/</a></p><p><a href="https://therecord.media/strike-force-southeast-asia-scams" rel="noopener noreferrer" target="_blank">https://therecord.media/strike-force-southeast-asia-scams</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-sues-to-dismantle-chinese-phishing-platform-behind-us-toll-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-sues-to-dismantle-chinese-phishing-platform-behind-us-toll-scams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-uk-laws-to-strengthen-critical-infrastructure-cyber-defenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-uk-laws-to-strengthen-critical-infrastructure-cyber-defenses/</a></p><p><a href="https://thecyberexpress.com/openai-court-order-nyt-copyright-dispute/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/openai-court-order-nyt-copyright-dispute/</a></p><p><a href="https://cybersecuritynews.com/citrix-netscaler-adc-and-gateway-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/citrix-netscaler-adc-and-gateway-vulnerability/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/</a></p><p><a href="https://therecord.media/cyber-command-nsa-potential-pick-lt-gen-joshua-rudd" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-potential-pick-lt-gen-joshua-rudd</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1011: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Court Order Sparks NYT Copyright Dispute Over AI Training Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmunk Citrix NetScaler ADC and Gateway Vulnerability Patched</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched by Ivanti and Zoom Products</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/</a></p><p><a href="https://thecyberexpress.com/china-cyberattack-accusation/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/china-cyberattack-accusation/</a></p><p><a href="https://therecord.media/strike-force-southeast-asia-scams" rel="noopener noreferrer" target="_blank">https://therecord.media/strike-force-southeast-asia-scams</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-sues-to-dismantle-chinese-phishing-platform-behind-us-toll-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-sues-to-dismantle-chinese-phishing-platform-behind-us-toll-scams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-uk-laws-to-strengthen-critical-infrastructure-cyber-defenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-uk-laws-to-strengthen-critical-infrastructure-cyber-defenses/</a></p><p><a href="https://thecyberexpress.com/openai-court-order-nyt-copyright-dispute/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/openai-court-order-nyt-copyright-dispute/</a></p><p><a href="https://cybersecuritynews.com/citrix-netscaler-adc-and-gateway-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/citrix-netscaler-adc-and-gateway-vulnerability/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/</a></p><p><a href="https://therecord.media/cyber-command-nsa-potential-pick-lt-gen-joshua-rudd" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-potential-pick-lt-gen-joshua-rudd</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6b5d44d0-e206-459c-bdbb-687f4b395a83</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 13 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6b5d44d0-e206-459c-bdbb-687f4b395a83.mp3" length="5840492" type="audio/mpeg"/><itunes:duration>12:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1011</itunes:episode><podcast:episode>1011</podcast:episode></item><item><title>GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws</title><itunes:title>GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws</itunes:title><description><![CDATA[<p>🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1010: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Firefox 145 Released with Security Updates and Performance Improvements</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WhatsApp Malware Maverick Hijacks Accounts in Sophisticated Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/</a></p><p><a href="https://thecyberexpress.com/asahi-cyberattack-japan-operations-crippled/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/asahi-cyberattack-japan-operations-crippled/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/</a></p><p><a href="https://www.securityweek.com/adobe-patches-29-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-29-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/ivanti-endpoint-manager-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-endpoint-manager-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/</a></p><p><a href="https://cybersecuritynews.com/firefox-145/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/firefox-145/</a></p><p><a href="https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html</a></p><p><a href="https://cybersecuritynews.com/new-vanhelsing-ransomware-raas-model/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/new-vanhelsing-ransomware-raas-model/</a></p><p><a href="https://therecord.media/enforcement-begins-new-york-pricing-law" rel="noopener noreferrer" target="_blank">https://therecord.media/enforcement-begins-new-york-pricing-law</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1010: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Firefox 145 Released with Security Updates and Performance Improvements</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WhatsApp Malware Maverick Hijacks Accounts in Sophisticated Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/</a></p><p><a href="https://thecyberexpress.com/asahi-cyberattack-japan-operations-crippled/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/asahi-cyberattack-japan-operations-crippled/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-actively-exploited-windows-kernel-zero-day/</a></p><p><a href="https://www.securityweek.com/adobe-patches-29-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-29-vulnerabilities/</a></p><p><a href="https://cybersecuritynews.com/ivanti-endpoint-manager-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ivanti-endpoint-manager-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-flaws-in-sql-anywhere-monitor-solution-manager/</a></p><p><a href="https://cybersecuritynews.com/firefox-145/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/firefox-145/</a></p><p><a href="https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html</a></p><p><a href="https://cybersecuritynews.com/new-vanhelsing-ransomware-raas-model/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/new-vanhelsing-ransomware-raas-model/</a></p><p><a href="https://therecord.media/enforcement-begins-new-york-pricing-law" rel="noopener noreferrer" target="_blank">https://therecord.media/enforcement-begins-new-york-pricing-law</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitcoin-queen-gets-11-years-in-prison-for-73-billion-bitcoin-scam/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6c4808fc-1506-461d-93b2-8dbc3ece84bd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 12 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6c4808fc-1506-461d-93b2-8dbc3ece84bd.mp3" length="7557548" type="audio/mpeg"/><itunes:duration>15:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1010</itunes:episode><podcast:episode>1010</podcast:episode></item><item><title>Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub</title><itunes:title>Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub</itunes:title><description><![CDATA[<p>🎙️ Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1009: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA 2015 Information Sharing Law Renewal Bill Ending Shutdown Threat</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;QNAP Recalling Storage Appliances Vulnerable to RCE Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Orders Feds to Patch Samsung Zero-Day Used in Spyware Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/</a></p><p><a href="https://cybersecuritynews.com/chinese-cybersecurity-firm-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chinese-cybersecurity-firm-data-breach/</a></p><p><a href="https://www.bankinfosecurity.com/cmmc-new-cyber-rules-hit-defense-supply-chain-a-29977" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cmmc-new-cyber-rules-hit-defense-supply-chain-a-29977</a></p><p><a href="https://therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/</a></p><p><a href="https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/</a></p><p><a href="https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1009: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA 2015 Information Sharing Law Renewal Bill Ending Shutdown Threat</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;QNAP Recalling Storage Appliances Vulnerable to RCE Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Orders Feds to Patch Samsung Zero-Day Used in Spyware Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nearly-30-alleged-victims-of-oracle-ebs-hack-named-on-cl0p-ransomware-site/</a></p><p><a href="https://cybersecuritynews.com/chinese-cybersecurity-firm-data-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chinese-cybersecurity-firm-data-breach/</a></p><p><a href="https://www.bankinfosecurity.com/cmmc-new-cyber-rules-hit-defense-supply-chain-a-29977" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cmmc-new-cyber-rules-hit-defense-supply-chain-a-29977</a></p><p><a href="https://therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-samsung-zero-day-used-in-spyware-attacks/</a></p><p><a href="https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/</a></p><p><a href="https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f873325a-3c39-4a32-95de-e040dcb234c5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 11 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f873325a-3c39-4a32-95de-e040dcb234c5.mp3" length="6301100" type="audio/mpeg"/><itunes:duration>13:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1009</itunes:episode><podcast:episode>1009</podcast:episode></item><item><title>Nevada Ransomware Autopsy Reveals $1.3M Recovery, CBO Breached by Nation-State, and Samsung Zero-Day Spyware Campaign</title><itunes:title>Nevada Ransomware Autopsy Reveals $1.3M Recovery, CBO Breached by Nation-State, and Samsung Zero-Day Spyware Campaign</itunes:title><description><![CDATA[<p>🎙️ Nevada Ransomware Traced to Malware Developer, CBO Cyberattack, Samsung Landfall Android Spyware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1008: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attacks Against macOS Users Evolving with New Techniques</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Actively Exploited Firewall Flaws Now Abused for DDoS Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenVSX with 3 New VSCode Extensions Found to Contain Malicious Code</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/nevada-ransomware-attack-traced-back-to-malware-download-by-employee/805011/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nevada-ransomware-attack-traced-back-to-malware-download-by-employee/805011/</a></p><p><a href="https://therecord.media/cbo-implements-controls-following-cyberattack-reports" rel="noopener noreferrer" target="_blank">https://therecord.media/cbo-implements-controls-following-cyberattack-reports</a></p><p><a href="https://therecord.media/ed-tech-company-fined-5-million-data-breach-security-practices" rel="noopener noreferrer" target="_blank">https://therecord.media/ed-tech-company-fined-5-million-data-breach-security-practices</a></p><p><a href="https://www.securityweek.com/landfall-android-spyware-targeted-samsung-phones-via-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/landfall-android-spyware-targeted-samsung-phones-via-zero-day/</a></p><p><a href="https://www.securityweek.com/clickfix-attacks-against-macos-users-evolving/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/clickfix-attacks-against-macos-users-evolving/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/</a></p><p><a href="https://therecord.media/eu-parliament-committee-votes-europol-data-sharing-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-parliament-committee-votes-europol-data-sharing-agreement</a></p><p><a href="https://www.securityweek.com/doj-antitrust-review-clears-googles-32-billion-acquisition-of-wiz/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/doj-antitrust-review-clears-googles-32-billion-acquisition-of-wiz/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Nevada Ransomware Traced to Malware Developer, CBO Cyberattack, Samsung Landfall Android Spyware</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1008: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attacks Against macOS Users Evolving with New Techniques</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Actively Exploited Firewall Flaws Now Abused for DDoS Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenVSX with 3 New VSCode Extensions Found to Contain Malicious Code</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/nevada-ransomware-attack-traced-back-to-malware-download-by-employee/805011/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nevada-ransomware-attack-traced-back-to-malware-download-by-employee/805011/</a></p><p><a href="https://therecord.media/cbo-implements-controls-following-cyberattack-reports" rel="noopener noreferrer" target="_blank">https://therecord.media/cbo-implements-controls-following-cyberattack-reports</a></p><p><a href="https://therecord.media/ed-tech-company-fined-5-million-data-breach-security-practices" rel="noopener noreferrer" target="_blank">https://therecord.media/ed-tech-company-fined-5-million-data-breach-security-practices</a></p><p><a href="https://www.securityweek.com/landfall-android-spyware-targeted-samsung-phones-via-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/landfall-android-spyware-targeted-samsung-phones-via-zero-day/</a></p><p><a href="https://www.securityweek.com/clickfix-attacks-against-macos-users-evolving/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/clickfix-attacks-against-macos-users-evolving/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-fixes-seven-nas-zero-day-vulnerabilities-exploited-at-pwn2own/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/</a></p><p><a href="https://therecord.media/eu-parliament-committee-votes-europol-data-sharing-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-parliament-committee-votes-europol-data-sharing-agreement</a></p><p><a href="https://www.securityweek.com/doj-antitrust-review-clears-googles-32-billion-acquisition-of-wiz/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/doj-antitrust-review-clears-googles-32-billion-acquisition-of-wiz/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4934c4dc-49b3-4a7c-803b-0149fc9a0669</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 10 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4934c4dc-49b3-4a7c-803b-0149fc9a0669.mp3" length="8110700" type="audio/mpeg"/><itunes:duration>16:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1008</itunes:episode><podcast:episode>1008</podcast:episode></item><item><title>Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks &amp; Spencer Cyberattack, US Sanctions North Korea</title><itunes:title>Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks &amp; Spencer Cyberattack, US Sanctions North Korea</itunes:title><description><![CDATA[<p>🎙️ Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks &amp; Spencer Cyberattack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1007: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Sentences 5 Myanmar Scam Kingpins to Death in Major Crackdown</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;European Police Bust Crypto Payment Firms Linked to Cybercrime</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Critical Centos Web Panel Bug Being Actively Exploited</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/</a></p><p><a href="https://therecord.media/marks-spencer-profits-wiped-out-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/marks-spencer-profits-wiped-out-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/</a></p><p><a href="https://thehackernews.com/2025/11/us-sanctions-10-north-korean-entities.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/us-sanctions-10-north-korean-entities.html</a></p><p><a href="https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death" rel="noopener noreferrer" target="_blank">https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death</a></p><p><a href="https://therecord.media/europe-police-bust-global-fraud-ring-payment-firms" rel="noopener noreferrer" target="_blank">https://therecord.media/europe-police-bust-global-fraud-ring-payment-firms</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/malware-now-uses-ai-during-execution-to-mutate-and-collect-data-google-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/malware-now-uses-ai-during-execution-to-mutate-and-collect-data-google-warns/</a></p><p><a href="https://thehackernews.com/2025/11/researchers-find-chatgpt.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/researchers-find-chatgpt.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks &amp; Spencer Cyberattack</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1007: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Sentences 5 Myanmar Scam Kingpins to Death in Major Crackdown</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;European Police Bust Crypto Payment Firms Linked to Cybercrime</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Critical Centos Web Panel Bug Being Actively Exploited</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/</a></p><p><a href="https://therecord.media/marks-spencer-profits-wiped-out-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/marks-spencer-profits-wiped-out-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/</a></p><p><a href="https://thehackernews.com/2025/11/us-sanctions-10-north-korean-entities.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/us-sanctions-10-north-korean-entities.html</a></p><p><a href="https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death" rel="noopener noreferrer" target="_blank">https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death</a></p><p><a href="https://therecord.media/europe-police-bust-global-fraud-ring-payment-firms" rel="noopener noreferrer" target="_blank">https://therecord.media/europe-police-bust-global-fraud-ring-payment-firms</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/malware-now-uses-ai-during-execution-to-mutate-and-collect-data-google-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/malware-now-uses-ai-during-execution-to-mutate-and-collect-data-google-warns/</a></p><p><a href="https://thehackernews.com/2025/11/researchers-find-chatgpt.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/researchers-find-chatgpt.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ac9ee616-6a1e-4c5b-8ddf-d19c2a2e9c3e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 06 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ac9ee616-6a1e-4c5b-8ddf-d19c2a2e9c3e.mp3" length="9169004" type="audio/mpeg"/><itunes:duration>19:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1007</itunes:episode><podcast:episode>1007</podcast:episode></item><item><title>🎙️ Nikkei Breach, Android Malware Surge, WordPress Exploit, React Native Flaw, and Global Cybercrime Merger</title><itunes:title>🎙️ Nikkei Breach, Android Malware Surge, WordPress Exploit, React Native Flaw, and Global Cybercrime Merger</itunes:title><description><![CDATA[<p>🎙️ Global Software Breaches, Android Apps Turn Malicious, Cybercrime Gangs Merge</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1006: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apache OpenOffice disputes ransomware gang’s data-leak claims</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;IDF recalls Chinese-made cars over embedded security concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tycoon 2FA phishing kit bypasses MFA protections</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/</a></p><p><a href="https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency</a></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/</a></p><p><a href="https://www.timesofisrael.com/liveblog_entry/idf-reportedly-recalling-700-senior-officers-chinese-cars-due-to-security-fears/" rel="noopener noreferrer" target="_blank">https://www.timesofisrael.com/liveblog_entry/idf-reportedly-recalling-700-senior-officers-chinese-cars-due-to-security-fears/</a></p><p><a href="https://cybersecuritynews.com/attack-techniques-of-tycoon-2fa-phishing-kit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/attack-techniques-of-tycoon-2fa-phishing-kit/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/</a></p><p><a href="https://www.securityweek.com/critical-flaw-in-popular-react-native-npm-package-exposes-developers-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-flaw-in-popular-react-native-npm-package-exposes-developers-to-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/</a></p><p><a href="https://www.securityweek.com/android-update-patches-critical-remote-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-critical-remote-code-execution-flaw/</a></p><p><a href="https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html</a></p><p><a href="https://therecord.media/9-arrested-europe-crypto-platform-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/9-arrested-europe-crypto-platform-takedown</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Global Software Breaches, Android Apps Turn Malicious, Cybercrime Gangs Merge</p><p>🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience.</p><p>Ep – 1006: Today's episode will discuss the latest news:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apache OpenOffice disputes ransomware gang’s data-leak claims</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;IDF recalls Chinese-made cars over embedded security concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tycoon 2FA phishing kit bypasses MFA protections</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/</a></p><p><a href="https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency</a></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/</a></p><p><a href="https://www.timesofisrael.com/liveblog_entry/idf-reportedly-recalling-700-senior-officers-chinese-cars-due-to-security-fears/" rel="noopener noreferrer" target="_blank">https://www.timesofisrael.com/liveblog_entry/idf-reportedly-recalling-700-senior-officers-chinese-cars-due-to-security-fears/</a></p><p><a href="https://cybersecuritynews.com/attack-techniques-of-tycoon-2fa-phishing-kit/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/attack-techniques-of-tycoon-2fa-phishing-kit/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/</a></p><p><a href="https://www.securityweek.com/critical-flaw-in-popular-react-native-npm-package-exposes-developers-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-flaw-in-popular-react-native-npm-package-exposes-developers-to-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/</a></p><p><a href="https://www.securityweek.com/android-update-patches-critical-remote-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-critical-remote-code-execution-flaw/</a></p><p><a href="https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html</a></p><p><a href="https://therecord.media/9-arrested-europe-crypto-platform-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/9-arrested-europe-crypto-platform-takedown</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4c63cc85-9349-4732-ac04-0caba4db46f7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 05 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4c63cc85-9349-4732-ac04-0caba4db46f7.mp3" length="6579692" type="audio/mpeg"/><itunes:duration>13:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1006</itunes:episode><podcast:episode>1006</podcast:episode></item><item><title>🎙️ $120M DeFi Heist, AI API Exploits, Water &amp; Shipping Breaches, Apple Patches, and Cybercrime Indictments</title><itunes:title>🎙️ $120M DeFi Heist, AI API Exploits, Water &amp; Shipping Breaches, Apple Patches, and Cybercrime Indictments</itunes:title><description><![CDATA[<p>🎙️ $120M DeFi Heist, AI Tools Abused for Attacks, Water &amp; Shipping Systems Breached</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1005: Today's episode will discuss the latest news $120M DeFi Heist and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Claude AI and OpenAI APIs exploited for data exfiltration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple patches critical vulnerabilities in iOS and macOS</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Belarus military hit by SSH/Tor backdoor malware</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/</a></p><p><a href="https://therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis" rel="noopener noreferrer" target="_blank">https://therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/</a></p><p><a href="https://therecord.media/data-breach-costs-lead-to-profit-decline-south-korea-telecom" rel="noopener noreferrer" target="_blank">https://therecord.media/data-breach-costs-lead-to-profit-decline-south-korea-telecom</a></p><p><a href="https://www.securityweek.com/claude-ai-apis-can-be-abused-for-data-exfiltration/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/claude-ai-apis-can-be-abused-for-data-exfiltration/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/apple-patches-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/apple-patches-critical-vulnerabilities/</a></p><p><a href="https://thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/ukrainian-extradited-to-us-faces-charges-in-jabber-zeus-cybercrime-case/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ukrainian-extradited-to-us-faces-charges-in-jabber-zeus-cybercrime-case/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ $120M DeFi Heist, AI Tools Abused for Attacks, Water &amp; Shipping Systems Breached</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1005: Today's episode will discuss the latest news $120M DeFi Heist and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Claude AI and OpenAI APIs exploited for data exfiltration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple patches critical vulnerabilities in iOS and macOS</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Belarus military hit by SSH/Tor backdoor malware</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/</a></p><p><a href="https://therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis" rel="noopener noreferrer" target="_blank">https://therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/</a></p><p><a href="https://therecord.media/data-breach-costs-lead-to-profit-decline-south-korea-telecom" rel="noopener noreferrer" target="_blank">https://therecord.media/data-breach-costs-lead-to-profit-decline-south-korea-telecom</a></p><p><a href="https://www.securityweek.com/claude-ai-apis-can-be-abused-for-data-exfiltration/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/claude-ai-apis-can-be-abused-for-data-exfiltration/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/</a></p><p><a href="https://cybersecuritynews.com/apple-patches-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/apple-patches-critical-vulnerabilities/</a></p><p><a href="https://thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/ukrainian-extradited-to-us-faces-charges-in-jabber-zeus-cybercrime-case/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ukrainian-extradited-to-us-faces-charges-in-jabber-zeus-cybercrime-case/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7883d3cd-9e88-47d4-8c12-d94322d26d61</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 04 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7883d3cd-9e88-47d4-8c12-d94322d26d61.mp3" length="8698412" type="audio/mpeg"/><itunes:duration>18:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1005</itunes:episode><podcast:episode>1005</podcast:episode></item><item><title>🎙️ U.S. Telecom Breach by Nation-State Hackers, China Zero-Day Exploits, FCC Cyber Rollback, and OT Security Guidance 🚨</title><itunes:title>🎙️ U.S. Telecom Breach by Nation-State Hackers, China Zero-Day Exploits, FCC Cyber Rollback, and OT Security Guidance 🚨</itunes:title><description><![CDATA[<p>🎙️ Nation-State Hackers Hit U.S. Telecom, China Exploits Firewalls &amp; Zero-Days, FCC Rolls Back Cyber Rules</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1004: Today's episode will discuss the latest news Major US Telecom Backbone Hacked by Nation-State and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;University of Pennsylvania Hacker Claims 1.2 Million Donor Records</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China-Linked Actors Exploit Lanscope Zero-Day and Scan Global Firewalls</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ongoing ‘BadCandy’ Attacks Warned by Australian Signals Directorate</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/major-us-telecom-backbone-firm-hacked-by-nation-state-actors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/major-us-telecom-backbone-firm-hacked-by-nation-state-actors/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/</a></p><p><a href="https://therecord.media/chinese-hackers-scan-exploit-firewalls-government" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-hackers-scan-exploit-firewalls-government</a></p><p><a href="https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-lanscope-flaw-as-a-zero-day-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-lanscope-flaw-as-a-zero-day-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/</a></p><p><a href="https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html</a></p><p><a href="https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-nsa-share-tips-on-securing-microsoft-exchange-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-nsa-share-tips-on-securing-microsoft-exchange-servers/</a></p><p><a href="https://thecyberexpress.com/fcc-to-reverse-telecom-cybersecurity-mandate/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fcc-to-reverse-telecom-cybersecurity-mandate/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Nation-State Hackers Hit U.S. Telecom, China Exploits Firewalls &amp; Zero-Days, FCC Rolls Back Cyber Rules</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1004: Today's episode will discuss the latest news Major US Telecom Backbone Hacked by Nation-State and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;University of Pennsylvania Hacker Claims 1.2 Million Donor Records</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China-Linked Actors Exploit Lanscope Zero-Day and Scan Global Firewalls</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ongoing ‘BadCandy’ Attacks Warned by Australian Signals Directorate</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/major-us-telecom-backbone-firm-hacked-by-nation-state-actors/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/major-us-telecom-backbone-firm-hacked-by-nation-state-actors/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/</a></p><p><a href="https://therecord.media/chinese-hackers-scan-exploit-firewalls-government" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-hackers-scan-exploit-firewalls-government</a></p><p><a href="https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-lanscope-flaw-as-a-zero-day-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/china-linked-hackers-exploited-lanscope-flaw-as-a-zero-day-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/</a></p><p><a href="https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html</a></p><p><a href="https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-nsa-share-tips-on-securing-microsoft-exchange-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-nsa-share-tips-on-securing-microsoft-exchange-servers/</a></p><p><a href="https://thecyberexpress.com/fcc-to-reverse-telecom-cybersecurity-mandate/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/fcc-to-reverse-telecom-cybersecurity-mandate/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0c9272f3-4366-456f-962a-c1b36912029b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 03 Nov 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0c9272f3-4366-456f-962a-c1b36912029b.mp3" length="7862444" type="audio/mpeg"/><itunes:duration>16:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1004</itunes:episode><podcast:episode>1004</podcast:episode></item><item><title>Canada Hacktivists Breach Water &amp; Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws</title><itunes:title>Canada Hacktivists Breach Water &amp; Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws</itunes:title><description><![CDATA[<p>🎙️ Canada Hacktivists Breach Water &amp; Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1003: Today's episode will discuss the latest news Canada Hacktivists Breach Water &amp; Energy and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft DNS Outage Impacts Azure and Microsoft 365 Services</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome 142 Released Fixes 20 Vulnerabilities Including High Severity Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Experts Report Sharp Increase in HTML Smuggling Attack Techniques</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/</a></p><p><a href="https://therecord.media/millions-impacted-breach-conduent" rel="noopener noreferrer" target="_blank">https://therecord.media/millions-impacted-breach-conduent</a></p><p><a href="https://www.securityweek.com/former-defense-contractor-executive-admits-to-selling-exploits-to-russia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-defense-contractor-executive-admits-to-selling-exploits-to-russia/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/</a></p><p><a href="https://cybersecuritynews.com/chrome-142-released-fix-20-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-142-released-fix-20-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html</a></p><p><a href="https://cybersecuritynews.com/ghost-spns-and-kerberos-reflection-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ghost-spns-and-kerberos-reflection-attack/</a></p><p><a href="https://www.securityweek.com/mitre-unveils-attck-v18-with-updates-to-detections-mobile-ics/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-unveils-attck-v18-with-updates-to-detections-mobile-ics/</a></p><p><a href="https://therecord.media/national-security-agency-vacancies-director-deputy-general-counsel" rel="noopener noreferrer" target="_blank">https://therecord.media/national-security-agency-vacancies-director-deputy-general-counsel</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Canada Hacktivists Breach Water &amp; Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1003: Today's episode will discuss the latest news Canada Hacktivists Breach Water &amp; Energy and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft DNS Outage Impacts Azure and Microsoft 365 Services</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome 142 Released Fixes 20 Vulnerabilities Including High Severity Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Experts Report Sharp Increase in HTML Smuggling Attack Techniques</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/</a></p><p><a href="https://therecord.media/millions-impacted-breach-conduent" rel="noopener noreferrer" target="_blank">https://therecord.media/millions-impacted-breach-conduent</a></p><p><a href="https://www.securityweek.com/former-defense-contractor-executive-admits-to-selling-exploits-to-russia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-defense-contractor-executive-admits-to-selling-exploits-to-russia/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/</a></p><p><a href="https://cybersecuritynews.com/chrome-142-released-fix-20-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/chrome-142-released-fix-20-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html</a></p><p><a href="https://cybersecuritynews.com/ghost-spns-and-kerberos-reflection-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/ghost-spns-and-kerberos-reflection-attack/</a></p><p><a href="https://www.securityweek.com/mitre-unveils-attck-v18-with-updates-to-detections-mobile-ics/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitre-unveils-attck-v18-with-updates-to-detections-mobile-ics/</a></p><p><a href="https://therecord.media/national-security-agency-vacancies-director-deputy-general-counsel" rel="noopener noreferrer" target="_blank">https://therecord.media/national-security-agency-vacancies-director-deputy-general-counsel</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fa6e4c6f-066e-491a-aa79-3f5f7c9197d3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 30 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fa6e4c6f-066e-491a-aa79-3f5f7c9197d3.mp3" length="7577708" type="audio/mpeg"/><itunes:duration>15:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1003</itunes:episode><podcast:episode>1003</podcast:episode></item><item><title>Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings</title><itunes:title>Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings</itunes:title><description><![CDATA[<p>🎙️ Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1002: Today's episode will discuss the latest news highlighting Dentsu Data Breach and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia-Linked Breaches in Ukraine Flying Off the Land Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Two More Actively Exploited Zero-Days Targeting Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;10 NPM Packages Caught Stealing Sensitive Data from Developers</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/</a></p><p><a href="https://www.securityweek.com/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack/</a></p><p><a href="https://cybersecuritynews.com/hackers-allegedly-claims-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-allegedly-claims-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/f5-cyberattack-revenue-hit-forecast/803984/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/f5-cyberattack-revenue-hit-forecast/803984/</a></p><p><a href="https://therecord.media/russia-linked-breaches-ukraine-living-off-the-land" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-linked-breaches-ukraine-living-off-the-land</a></p><p><a href="https://thecyberexpress.com/apache-tomcat-cve-2025-55752/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/apache-tomcat-cve-2025-55752/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html</a></p><p><a href="https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-hacking-trellix-report/803641/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-hacking-trellix-report/803641/</a></p><p><a href="https://www.securityweek.com/stragglers-from-myanmar-scam-center-raided-by-army-cross-into-thailand-as-buildings-are-blown-up/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/stragglers-from-myanmar-scam-center-raided-by-army-cross-into-thailand-as-buildings-are-blown-up/</a></p><p><a href="https://therecord.media/fcc-adopts-new-rule-targeting-robocalls" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-adopts-new-rule-targeting-robocalls</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1002: Today's episode will discuss the latest news highlighting Dentsu Data Breach and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia-Linked Breaches in Ukraine Flying Off the Land Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Two More Actively Exploited Zero-Days Targeting Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;10 NPM Packages Caught Stealing Sensitive Data from Developers</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/</a></p><p><a href="https://www.securityweek.com/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack/</a></p><p><a href="https://cybersecuritynews.com/hackers-allegedly-claims-breach/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-allegedly-claims-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/f5-cyberattack-revenue-hit-forecast/803984/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/f5-cyberattack-revenue-hit-forecast/803984/</a></p><p><a href="https://therecord.media/russia-linked-breaches-ukraine-living-off-the-land" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-linked-breaches-ukraine-living-off-the-land</a></p><p><a href="https://thecyberexpress.com/apache-tomcat-cve-2025-55752/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/apache-tomcat-cve-2025-55752/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html</a></p><p><a href="https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-hacking-trellix-report/803641/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-hacking-trellix-report/803641/</a></p><p><a href="https://www.securityweek.com/stragglers-from-myanmar-scam-center-raided-by-army-cross-into-thailand-as-buildings-are-blown-up/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/stragglers-from-myanmar-scam-center-raided-by-army-cross-into-thailand-as-buildings-are-blown-up/</a></p><p><a href="https://therecord.media/fcc-adopts-new-rule-targeting-robocalls" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-adopts-new-rule-targeting-robocalls</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">44dd9929-a077-4013-81a3-374f4c3823d0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 29 Oct 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/44dd9929-a077-4013-81a3-374f4c3823d0.mp3" length="8657708" type="audio/mpeg"/><itunes:duration>18:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1002</itunes:episode><podcast:episode>1002</podcast:episode></item><item><title>Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones</title><itunes:title>Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones</itunes:title><description><![CDATA[<p>🎙️ Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1001: Today's episode will discuss the latest news highlighting Sweden Power Grid Data Breach and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Target Perplexity Comet Browser Users in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;X Re-Enroll 2FA Security Keys by November 10 or Get Locked Out</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italian Spyware Vendor Linked to Chrome Zero-Day Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/sweden-power-grid-operator-data" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-power-grid-operator-data</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-disputes-false-claims-of-massive-gmail-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-disputes-false-claims-of-massive-gmail-data-breach/</a></p><p><a href="https://www.securityweek.com/north-korean-hackers-aim-at-european-drone-companies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-aim-at-european-drone-companies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-warns-its-windows-backup-software-is-also-affected-by-critical-aspnet-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-warns-its-windows-backup-software-is-also-affected-by-critical-aspnet-flaw/</a></p><p><a href="https://www.securityweek.com/massive-china-linked-smishing-campaign-leveraged-194000-domains/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/massive-china-linked-smishing-campaign-leveraged-194000-domains/</a></p><p><a href="https://www.securityweek.com/hackers-target-perplexity-comet-browser-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-perplexity-comet-browser-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/italian-spyware-vendor-linked-to-chrome-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/italian-spyware-vendor-linked-to-chrome-zero-day-attacks/</a></p><p><a href="https://therecord.media/us-declines-signing-cybercrime-treaty" rel="noopener noreferrer" target="_blank">https://therecord.media/us-declines-signing-cybercrime-treaty</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1001: Today's episode will discuss the latest news highlighting Sweden Power Grid Data Breach and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Target Perplexity Comet Browser Users in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;X Re-Enroll 2FA Security Keys by November 10 or Get Locked Out</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italian Spyware Vendor Linked to Chrome Zero-Day Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/sweden-power-grid-operator-data" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-power-grid-operator-data</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-disputes-false-claims-of-massive-gmail-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-disputes-false-claims-of-massive-gmail-data-breach/</a></p><p><a href="https://www.securityweek.com/north-korean-hackers-aim-at-european-drone-companies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-aim-at-european-drone-companies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-warns-its-windows-backup-software-is-also-affected-by-critical-aspnet-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-warns-its-windows-backup-software-is-also-affected-by-critical-aspnet-flaw/</a></p><p><a href="https://www.securityweek.com/massive-china-linked-smishing-campaign-leveraged-194000-domains/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/massive-china-linked-smishing-campaign-leveraged-194000-domains/</a></p><p><a href="https://www.securityweek.com/hackers-target-perplexity-comet-browser-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-perplexity-comet-browser-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/x-re-enroll-2fa-security-keys-by-november-10-or-get-locked-out/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/italian-spyware-vendor-linked-to-chrome-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/italian-spyware-vendor-linked-to-chrome-zero-day-attacks/</a></p><p><a href="https://therecord.media/us-declines-signing-cybercrime-treaty" rel="noopener noreferrer" target="_blank">https://therecord.media/us-declines-signing-cybercrime-treaty</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">57ca2503-3810-4ae9-ab7c-9c5c7f4cd971</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 28 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/57ca2503-3810-4ae9-ab7c-9c5c7f4cd971.mp3" length="7871276" type="audio/mpeg"/><itunes:duration>16:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1001</itunes:episode><podcast:episode>1001</podcast:episode></item><item><title>CyberHub Episode 1000: When Trust Becomes the Target – WSUS Weaponized, Chrome Zero-Day Exploited, and Toys R Us Breached</title><itunes:title>CyberHub Episode 1000: When Trust Becomes the Target – WSUS Weaponized, Chrome Zero-Day Exploited, and Toys R Us Breached</itunes:title><description><![CDATA[<p>🎙️ EPISODE 1000! Toys R Us Canada Leak, Windows WSUS Exploited, Chrome Zero-Day Spyware</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1000: Today's episode will discuss the latest news as EPISODE 1000! Toys R Us Canada Leak and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Payments Dropped in Q3 2025 According to Analysis</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Attacks Surge in 2025 Despite Payment Decline</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Now Exploiting Critical Windows Server WSUS Flaw in Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/toys-r-us-canada-customer-information-leaked-online/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/toys-r-us-canada-customer-information-leaked-online/</a></p><p><a href="https://therecord.media/russia-food-safety-agency-rosselkhoznadzor-ddos-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-food-safety-agency-rosselkhoznadzor-ddos-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/</a></p><p><a href="https://www.securityweek.com/ransomware-payments-dropped-in-q3-2025-analysis/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-payments-dropped-in-q3-2025-analysis/</a></p><p><a href="https://thecyberexpress.com/ransomware-attacks-surge-in-2025/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ransomware-attacks-surge-in-2025/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/</a></p><p><a href="https://www.securityweek.com/chrome-zero-day-exploitation-linked-to-hacking-team-spyware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-zero-day-exploitation-linked-to-hacking-team-spyware/</a></p><p><a href="https://cybersecuritynews.com/hashicorp-vault-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hashicorp-vault-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html</a></p><p><a href="https://cybersecuritynews.com/breachforums-back-again/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/breachforums-back-again/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ EPISODE 1000! Toys R Us Canada Leak, Windows WSUS Exploited, Chrome Zero-Day Spyware</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 1000: Today's episode will discuss the latest news as EPISODE 1000! Toys R Us Canada Leak and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Payments Dropped in Q3 2025 According to Analysis</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Attacks Surge in 2025 Despite Payment Decline</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Now Exploiting Critical Windows Server WSUS Flaw in Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/toys-r-us-canada-customer-information-leaked-online/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/toys-r-us-canada-customer-information-leaked-online/</a></p><p><a href="https://therecord.media/russia-food-safety-agency-rosselkhoznadzor-ddos-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-food-safety-agency-rosselkhoznadzor-ddos-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/</a></p><p><a href="https://www.securityweek.com/ransomware-payments-dropped-in-q3-2025-analysis/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-payments-dropped-in-q3-2025-analysis/</a></p><p><a href="https://thecyberexpress.com/ransomware-attacks-surge-in-2025/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ransomware-attacks-surge-in-2025/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/</a></p><p><a href="https://www.securityweek.com/chrome-zero-day-exploitation-linked-to-hacking-team-spyware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-zero-day-exploitation-linked-to-hacking-team-spyware/</a></p><p><a href="https://cybersecuritynews.com/hashicorp-vault-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hashicorp-vault-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html</a></p><p><a href="https://cybersecuritynews.com/breachforums-back-again/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/breachforums-back-again/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c86825b2-ff37-4276-ab30-a2eda8cc3149</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 27 Oct 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c86825b2-ff37-4276-ab30-a2eda8cc3149.mp3" length="8949164" type="audio/mpeg"/><itunes:duration>18:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1000</itunes:episode><podcast:episode>1000</podcast:episode></item><item><title>Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited</title><itunes:title>Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited</itunes:title><description><![CDATA[<p>🎙️ Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Ep – 999: Today's episode will discuss the latest news as Hospital Cyberattacks TX TN IN and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MCP Server Platform Vulnerability Exposes Critical Systems</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Threat Actors Exploit ToolShell in Advanced Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tarmageddon Flaw in Popular Rust Library Leads to RCE</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/fencing-and-pet-company-jewett-cameron-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fencing-and-pet-company-jewett-cameron-hit-by-ransomware/</a></p><p><a href="https://thecyberexpress.com/athol-and-heywood-hospital-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/athol-and-heywood-hospital-cyberattack/</a></p><p><a href="https://therecord.media/cyber-incidents-texas-tennessee-indiana" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incidents-texas-tennessee-indiana</a></p><p><a href="https://therecord.media/facing-anne-keast-decades-gchq" rel="noopener noreferrer" target="_blank">https://therecord.media/facing-anne-keast-decades-gchq</a></p><p><a href="https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html</a></p><p><a href="https://cybersecuritynews.com/mcp-server-platform-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/mcp-server-platform-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html</a></p><p><a href="https://www.securityweek.com/tarmageddon-flaw-in-popular-rust-library-leads-to-rce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tarmageddon-flaw-in-popular-rust-library-leads-to-rce/</a></p><p><a href="https://cybersecuritynews.com/hackers-weaponizing-oauth-applications/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-weaponizing-oauth-applications/</a></p><p><a href="https://thecyberexpress.com/vidar-stealer-2-0-infostealer/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/vidar-stealer-2-0-infostealer/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Ep – 999: Today's episode will discuss the latest news as Hospital Cyberattacks TX TN IN and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MCP Server Platform Vulnerability Exposes Critical Systems</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Threat Actors Exploit ToolShell in Advanced Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tarmageddon Flaw in Popular Rust Library Leads to RCE</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/fencing-and-pet-company-jewett-cameron-hit-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fencing-and-pet-company-jewett-cameron-hit-by-ransomware/</a></p><p><a href="https://thecyberexpress.com/athol-and-heywood-hospital-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/athol-and-heywood-hospital-cyberattack/</a></p><p><a href="https://therecord.media/cyber-incidents-texas-tennessee-indiana" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incidents-texas-tennessee-indiana</a></p><p><a href="https://therecord.media/facing-anne-keast-decades-gchq" rel="noopener noreferrer" target="_blank">https://therecord.media/facing-anne-keast-decades-gchq</a></p><p><a href="https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html</a></p><p><a href="https://cybersecuritynews.com/mcp-server-platform-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/mcp-server-platform-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html</a></p><p><a href="https://www.securityweek.com/tarmageddon-flaw-in-popular-rust-library-leads-to-rce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tarmageddon-flaw-in-popular-rust-library-leads-to-rce/</a></p><p><a href="https://cybersecuritynews.com/hackers-weaponizing-oauth-applications/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-weaponizing-oauth-applications/</a></p><p><a href="https://thecyberexpress.com/vidar-stealer-2-0-infostealer/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/vidar-stealer-2-0-infostealer/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5819c327-7379-4684-a107-0df7bc85cae9</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 23 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5819c327-7379-4684-a107-0df7bc85cae9.mp3" length="8934572" type="audio/mpeg"/><itunes:duration>18:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>999</itunes:episode><podcast:episode>999</podcast:episode></item><item><title>SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed</title><itunes:title>SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed</itunes:title><description><![CDATA[<p>🎙️ SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 998: Today's episode will discuss the latest news as SnappyBee Malware Campaign and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Threat Actors Leverage NPM Ecosystem for Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cursor Windsurf IDEs Riddled with 94+ N-Day Chromium Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PolarEdge Targets Cisco ASUS QNAP Devices in Widespread Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-exploited-apple-kentico-microsoft-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-exploited-apple-kentico-microsoft-vulnerabilities/</a></p><p><a href="https://thecyberexpress.com/bitcoin-keys-exposed-via-libbitcoin-explorer/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/bitcoin-keys-exposed-via-libbitcoin-explorer/</a></p><p><a href="https://www.securityweek.com/oracle-releases-october-2025-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-releases-october-2025-patches/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-leverage-npm-ecosystem/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-leverage-npm-ecosystem/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cursor-windsurf-ides-riddled-with-94-plus-n-day-chromium-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cursor-windsurf-ides-riddled-with-94-plus-n-day-chromium-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/</a></p><p><a href="https://therecord.media/russia-apple-search-engine-default" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-apple-search-engine-default</a></p><p><a href="https://www.securityweek.com/dataminr-to-acquire-threatconnect-for-290-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dataminr-to-acquire-threatconnect-for-290-million/</a></p><p><a href="https://www.securityweek.com/veeam-to-acquire-data-security-firm-securiti-ai-for-1-7-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veeam-to-acquire-data-security-firm-securiti-ai-for-1-7-billion/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 998: Today's episode will discuss the latest news as SnappyBee Malware Campaign and more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Threat Actors Leverage NPM Ecosystem for Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cursor Windsurf IDEs Riddled with 94+ N-Day Chromium Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PolarEdge Targets Cisco ASUS QNAP Devices in Widespread Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-exploited-apple-kentico-microsoft-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-exploited-apple-kentico-microsoft-vulnerabilities/</a></p><p><a href="https://thecyberexpress.com/bitcoin-keys-exposed-via-libbitcoin-explorer/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/bitcoin-keys-exposed-via-libbitcoin-explorer/</a></p><p><a href="https://www.securityweek.com/oracle-releases-october-2025-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-releases-october-2025-patches/</a></p><p><a href="https://cybersecuritynews.com/threat-actors-leverage-npm-ecosystem/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/threat-actors-leverage-npm-ecosystem/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cursor-windsurf-ides-riddled-with-94-plus-n-day-chromium-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cursor-windsurf-ides-riddled-with-94-plus-n-day-chromium-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/</a></p><p><a href="https://therecord.media/russia-apple-search-engine-default" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-apple-search-engine-default</a></p><p><a href="https://www.securityweek.com/dataminr-to-acquire-threatconnect-for-290-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dataminr-to-acquire-threatconnect-for-290-million/</a></p><p><a href="https://www.securityweek.com/veeam-to-acquire-data-security-firm-securiti-ai-for-1-7-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veeam-to-acquire-data-security-firm-securiti-ai-for-1-7-billion/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5f5aec4e-6ec6-470f-8728-1039f97d887c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 22 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5f5aec4e-6ec6-470f-8728-1039f97d887c.mp3" length="9082796" type="audio/mpeg"/><itunes:duration>18:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>998</itunes:episode><podcast:episode>998</podcast:episode></item><item><title>AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk</title><itunes:title>AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk</itunes:title><description><![CDATA[<p>🎙️ AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 997: Today's episode will discuss the latest news as AWS Outage more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dairy Farm Leaked Information After Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dolby Digital Plus Zero-Click Vulnerability Threatens Media Devices</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MSS Claims NSA Used 42 Cyber Tools in Attacks Against China</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://cybersecuritynews.com/aws-outage/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/aws-outage/</a></p><p><a href="https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/</a></p><p><a href="https://therecord.media/dairy-farm-leaked-info-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/dairy-farm-leaked-info-ransomware</a></p><p><a href="https://cybersecuritynews.com/dolby-digital-plus-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/dolby-digital-plus-0-click-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-75-000-watchguard-security-devices-vulnerable-to-critical-rce/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-75-000-watchguard-security-devices-vulnerable-to-critical-rce/</a></p><p><a href="https://thecyberexpress.com/cisa-microsoft-apple-oracle-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-microsoft-apple-oracle-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html</a></p><p><a href="https://www.securityweek.com/south-korea-seeks-to-arrest-dozens-of-online-scam-suspects-repatriated-from-cambodia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/south-korea-seeks-to-arrest-dozens-of-online-scam-suspects-repatriated-from-cambodia/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 997: Today's episode will discuss the latest news as AWS Outage more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dairy Farm Leaked Information After Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dolby Digital Plus Zero-Click Vulnerability Threatens Media Devices</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MSS Claims NSA Used 42 Cyber Tools in Attacks Against China</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://cybersecuritynews.com/aws-outage/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/aws-outage/</a></p><p><a href="https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/</a></p><p><a href="https://therecord.media/dairy-farm-leaked-info-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/dairy-farm-leaked-info-ransomware</a></p><p><a href="https://cybersecuritynews.com/dolby-digital-plus-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/dolby-digital-plus-0-click-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-75-000-watchguard-security-devices-vulnerable-to-critical-rce/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-75-000-watchguard-security-devices-vulnerable-to-critical-rce/</a></p><p><a href="https://thecyberexpress.com/cisa-microsoft-apple-oracle-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cisa-microsoft-apple-oracle-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html</a></p><p><a href="https://www.securityweek.com/south-korea-seeks-to-arrest-dozens-of-online-scam-suspects-repatriated-from-cambodia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/south-korea-seeks-to-arrest-dozens-of-online-scam-suspects-repatriated-from-cambodia/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6a52bac7-ced5-4acb-9d9c-522fbfcd0d2d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 21 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6a52bac7-ced5-4acb-9d9c-522fbfcd0d2d.mp3" length="8615660" type="audio/mpeg"/><itunes:duration>17:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>997</itunes:episode><podcast:episode>997</podcast:episode></item><item><title>American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine</title><itunes:title>American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine</itunes:title><description><![CDATA[<p>🎙️ American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 996: Today's episode will discuss the latest news as American Airlines Envoy Air Oracle Hack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ConnectWise Fixes Automate Bug Allowing AitM Update Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Fixes Highest Severity ASP.NET Core Flaw Ever Discovered</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hackers-steal-sensitive-data-from-auction-house-sothebys/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-steal-sensitive-data-from-auction-house-sothebys/</a></p><p><a href="https://www.securityweek.com/american-airlines-subsidiary-envoy-air-hit-by-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/american-airlines-subsidiary-envoy-air-hit-by-oracle-hack/</a></p><p><a href="https://cybersecuritynews.com/volkswagen-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/volkswagen-ransomware-attack/</a></p><p><a href="https://www.securityweek.com/prosper-data-breach-impacts-17-6-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/prosper-data-breach-impacts-17-6-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-fixes-automate-bug-allowing-aitm-update-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-fixes-automate-bug-allowing-aitm-update-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-highest-severity-aspnet-core-flaw-ever/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-highest-severity-aspnet-core-flaw-ever/</a></p><p><a href="https://www.securityweek.com/microsoft-revokes-over-200-certificates-to-disrupt-ransomware-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-revokes-over-200-certificates-to-disrupt-ransomware-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/</a></p><p><a href="https://www.securityweek.com/china-accuses-us-of-cyberattack-on-national-time-center/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-accuses-us-of-cyberattack-on-national-time-center/</a></p><p><a href="https://www.securityweek.com/microsoft-russia-china-increasingly-using-ai-to-escalate-cyberattacks-on-the-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-russia-china-increasingly-using-ai-to-escalate-cyberattacks-on-the-us/</a></p><p><a href="https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html</a></p><p><a href="https://www.securityweek.com/nso-ordered-to-stop-hacking-whatsapp-but-damages-cut-to-4-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nso-ordered-to-stop-hacking-whatsapp-but-damages-cut-to-4-million/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 996: Today's episode will discuss the latest news as American Airlines Envoy Air Oracle Hack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ConnectWise Fixes Automate Bug Allowing AitM Update Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Fixes Highest Severity ASP.NET Core Flaw Ever Discovered</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hackers-steal-sensitive-data-from-auction-house-sothebys/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-steal-sensitive-data-from-auction-house-sothebys/</a></p><p><a href="https://www.securityweek.com/american-airlines-subsidiary-envoy-air-hit-by-oracle-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/american-airlines-subsidiary-envoy-air-hit-by-oracle-hack/</a></p><p><a href="https://cybersecuritynews.com/volkswagen-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/volkswagen-ransomware-attack/</a></p><p><a href="https://www.securityweek.com/prosper-data-breach-impacts-17-6-million-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/prosper-data-breach-impacts-17-6-million-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-fixes-automate-bug-allowing-aitm-update-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-fixes-automate-bug-allowing-aitm-update-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-highest-severity-aspnet-core-flaw-ever/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-highest-severity-aspnet-core-flaw-ever/</a></p><p><a href="https://www.securityweek.com/microsoft-revokes-over-200-certificates-to-disrupt-ransomware-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-revokes-over-200-certificates-to-disrupt-ransomware-campaign/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/</a></p><p><a href="https://www.securityweek.com/china-accuses-us-of-cyberattack-on-national-time-center/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-accuses-us-of-cyberattack-on-national-time-center/</a></p><p><a href="https://www.securityweek.com/microsoft-russia-china-increasingly-using-ai-to-escalate-cyberattacks-on-the-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-russia-china-increasingly-using-ai-to-escalate-cyberattacks-on-the-us/</a></p><p><a href="https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html</a></p><p><a href="https://www.securityweek.com/nso-ordered-to-stop-hacking-whatsapp-but-damages-cut-to-4-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nso-ordered-to-stop-hacking-whatsapp-but-damages-cut-to-4-million/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d0039f03-1e1e-410c-abca-2233f89df612</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 20 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d0039f03-1e1e-410c-abca-2233f89df612.mp3" length="8230700" type="audio/mpeg"/><itunes:duration>17:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>996</itunes:episode><podcast:episode>996</podcast:episode></item><item><title>F5 Nation-State Hack Source Code Stolen, Mango Data Breach, Capita $14M Fine 6.6M People</title><itunes:title>F5 Nation-State Hack Source Code Stolen, Mango Data Breach, Capita $14M Fine 6.6M People</itunes:title><description><![CDATA[<p>🎙️ F5 Nation-State Hack Source Code Stolen, Mango Data Breach, Capita $14M Fine 6.6M People</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 995: Today's episode will discuss the latest news as F5 Nation-State Hack Source Code Stolen with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Experience Manager Zero-Day Vulnerability Under Active Exploitation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Fixes Announced by Siemens Schneider Rockwell ABB Phoenix Contact</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched by Fortinet and Ivanti</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/</a></p><p><a href="https://www.securityweek.com/f5-hack-attack-linked-to-china-big-ip-flaws-patched-governments-issue-alerts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-hack-attack-linked-to-china-big-ip-flaws-patched-governments-issue-alerts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/</a></p><p><a href="https://cybersecuritynews.com/adobe-experience-manager-0-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/adobe-experience-manager-0-day-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-fixes-announced-by-siemens-schneider-rockwell-abb-phoenix-contact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-fixes-announced-by-siemens-schneider-rockwell-abb-phoenix-contact/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-fortinet-and-ivanti/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-fortinet-and-ivanti/</a></p><p><a href="https://therecord.media/cisco-asa-vulnerabilities-sen-bill-cassidy-questions" rel="noopener noreferrer" target="_blank">https://therecord.media/cisco-asa-vulnerabilities-sen-bill-cassidy-questions</a></p><p><a href="https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/</a></p><p><a href="https://thecyberexpress.com/florida-sues-roku-over-childrens-data-privacy/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/florida-sues-roku-over-childrens-data-privacy/</a></p><p><a href="https://www.securityweek.com/four-year-prison-sentence-for-powerschool-hacker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/four-year-prison-sentence-for-powerschool-hacker/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ F5 Nation-State Hack Source Code Stolen, Mango Data Breach, Capita $14M Fine 6.6M People</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 995: Today's episode will discuss the latest news as F5 Nation-State Hack Source Code Stolen with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Experience Manager Zero-Day Vulnerability Under Active Exploitation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Fixes Announced by Siemens Schneider Rockwell ABB Phoenix Contact</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched by Fortinet and Ivanti</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/</a></p><p><a href="https://www.securityweek.com/f5-hack-attack-linked-to-china-big-ip-flaws-patched-governments-issue-alerts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/f5-hack-attack-linked-to-china-big-ip-flaws-patched-governments-issue-alerts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/</a></p><p><a href="https://cybersecuritynews.com/adobe-experience-manager-0-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/adobe-experience-manager-0-day-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-fixes-announced-by-siemens-schneider-rockwell-abb-phoenix-contact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-fixes-announced-by-siemens-schneider-rockwell-abb-phoenix-contact/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-fortinet-and-ivanti/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-fortinet-and-ivanti/</a></p><p><a href="https://therecord.media/cisco-asa-vulnerabilities-sen-bill-cassidy-questions" rel="noopener noreferrer" target="_blank">https://therecord.media/cisco-asa-vulnerabilities-sen-bill-cassidy-questions</a></p><p><a href="https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/</a></p><p><a href="https://thecyberexpress.com/florida-sues-roku-over-childrens-data-privacy/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/florida-sues-roku-over-childrens-data-privacy/</a></p><p><a href="https://www.securityweek.com/four-year-prison-sentence-for-powerschool-hacker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/four-year-prison-sentence-for-powerschool-hacker/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c242c4d8-9b5e-4cf7-af9f-6b6c222ef507</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 16 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c242c4d8-9b5e-4cf7-af9f-6b6c222ef507.mp3" length="8072684" type="audio/mpeg"/><itunes:duration>16:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>995</itunes:episode><podcast:episode>995</podcast:episode></item><item><title>Microsoft Patch Tuesday 173 Flaws, Adobe Critical Bug, Feds Seize $1.5B Scam Empire</title><itunes:title>Microsoft Patch Tuesday 173 Flaws, Adobe Critical Bug, Feds Seize $1.5B Scam Empire</itunes:title><description><![CDATA[<p>🎙️ Microsoft Patch Tuesday 173 Flaws, Adobe Critical Bug, Feds Seize $1.5B Scam Empire</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 994: Today's episode will discuss the latest news as Microsoft Patch Tuesday 173 Flaws with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Taiwan NSB Report Shows China Surge in Cyberattacks and Influence Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PolarEdge Malware Uses Custom TLS Server for Stealth Communications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious Crypto-Stealing VSCode Extensions Resurface on OpenVSX Marketplace</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-vulnerability-in-collaboration-suite/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-vulnerability-in-collaboration-suite/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-vulnerabilities-in-netweaver-print-service-srm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-vulnerabilities-in-netweaver-print-service-srm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-geo-mapping-tool-for-year-long-persistence/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-geo-mapping-tool-for-year-long-persistence/</a></p><p><a href="https://therecord.media/taiwan-nsb-report-china-surge-cyberattacks-influence-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/taiwan-nsb-report-china-surge-cyberattacks-influence-operations</a></p><p><a href="https://cybersecuritynews.com/polaredge-with-custom-tls-server/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/polaredge-with-custom-tls-server/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-extensions-resurface-on-openvsx/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-extensions-resurface-on-openvsx/</a></p><p><a href="https://therecord.media/feds-sanction-cambodian-conglomerate-scams-seize-15-billion" rel="noopener noreferrer" target="_blank">https://therecord.media/feds-sanction-cambodian-conglomerate-scams-seize-15-billion</a></p><p><a href="https://therecord.media/california-enacts-age-verification-chatbot-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/california-enacts-age-verification-chatbot-laws</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Microsoft Patch Tuesday 173 Flaws, Adobe Critical Bug, Feds Seize $1.5B Scam Empire</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 994: Today's episode will discuss the latest news as Microsoft Patch Tuesday 173 Flaws with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Taiwan NSB Report Shows China Surge in Cyberattacks and Influence Operations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PolarEdge Malware Uses Custom TLS Server for Stealth Communications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious Crypto-Stealing VSCode Extensions Resurface on OpenVSX Marketplace</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-vulnerability-in-collaboration-suite/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-vulnerability-in-collaboration-suite/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-vulnerabilities-in-netweaver-print-service-srm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-vulnerabilities-in-netweaver-print-service-srm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-geo-mapping-tool-for-year-long-persistence/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-geo-mapping-tool-for-year-long-persistence/</a></p><p><a href="https://therecord.media/taiwan-nsb-report-china-surge-cyberattacks-influence-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/taiwan-nsb-report-china-surge-cyberattacks-influence-operations</a></p><p><a href="https://cybersecuritynews.com/polaredge-with-custom-tls-server/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/polaredge-with-custom-tls-server/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-extensions-resurface-on-openvsx/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-extensions-resurface-on-openvsx/</a></p><p><a href="https://therecord.media/feds-sanction-cambodian-conglomerate-scams-seize-15-billion" rel="noopener noreferrer" target="_blank">https://therecord.media/feds-sanction-cambodian-conglomerate-scams-seize-15-billion</a></p><p><a href="https://therecord.media/california-enacts-age-verification-chatbot-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/california-enacts-age-verification-chatbot-laws</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a8f33552-860e-4086-9d1b-7fb8a61bccae</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 15 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a8f33552-860e-4086-9d1b-7fb8a61bccae.mp3" length="7585772" type="audio/mpeg"/><itunes:duration>15:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>994</itunes:episode><podcast:episode>994</podcast:episode></item><item><title>UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach</title><itunes:title>UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach</itunes:title><description><![CDATA[<p>🎙️ UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 993: Today's episode will discuss the latest news as UK Record Cyberattacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SonicWall SSL VPN Accounts in Attacker Crosshairs for Credential Theft</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Multi-Country Botnet Targets RDP Services in the US</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-hit-by-record-number-significant-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-hit-by-record-number-significant-cyberattacks</a></p><p><a href="https://www.securityweek.com/extortion-group-leaks-millions-of-records-from-salesforce-hacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/extortion-group-leaks-millions-of-records-from-salesforce-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-releases-emergency-patch-for-new-e-business-suite-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-releases-emergency-patch-for-new-e-business-suite-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/</a></p><p><a href="https://cybersecuritynews.com/north-korean-hackers-attacking-developers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/north-korean-hackers-attacking-developers/</a></p><p><a href="https://www.securityweek.com/npm-infrastructure-abused-in-phishing-campaign-aimed-at-industrial-and-electronics-firms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/npm-infrastructure-abused-in-phishing-campaign-aimed-at-industrial-and-electronics-firms/</a></p><p><a href="https://www.securityweek.com/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/</a></p><p><a href="https://therecord.media/ukraine-takes-steps-dedicated-cyber-force" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-takes-steps-dedicated-cyber-force</a></p><p><a href="https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor" rel="noopener noreferrer" target="_blank">https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 993: Today's episode will discuss the latest news as UK Record Cyberattacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SonicWall SSL VPN Accounts in Attacker Crosshairs for Credential Theft</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Multi-Country Botnet Targets RDP Services in the US</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-hit-by-record-number-significant-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-hit-by-record-number-significant-cyberattacks</a></p><p><a href="https://www.securityweek.com/extortion-group-leaks-millions-of-records-from-salesforce-hacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/extortion-group-leaks-millions-of-records-from-salesforce-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-releases-emergency-patch-for-new-e-business-suite-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-releases-emergency-patch-for-new-e-business-suite-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/</a></p><p><a href="https://cybersecuritynews.com/north-korean-hackers-attacking-developers/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/north-korean-hackers-attacking-developers/</a></p><p><a href="https://www.securityweek.com/npm-infrastructure-abused-in-phishing-campaign-aimed-at-industrial-and-electronics-firms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/npm-infrastructure-abused-in-phishing-campaign-aimed-at-industrial-and-electronics-firms/</a></p><p><a href="https://www.securityweek.com/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/</a></p><p><a href="https://therecord.media/ukraine-takes-steps-dedicated-cyber-force" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-takes-steps-dedicated-cyber-force</a></p><p><a href="https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor" rel="noopener noreferrer" target="_blank">https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0c7a5cb3-8cd5-4751-b081-0ca0d3791970</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 14 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0c7a5cb3-8cd5-4751-b081-0ca0d3791970.mp3" length="8843180" type="audio/mpeg"/><itunes:duration>18:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>993</itunes:episode><podcast:episode>993</podcast:episode></item><item><title>Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums</title><itunes:title>Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums</itunes:title><description><![CDATA[<p>🎙️ Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 992: Today's episode will discuss the latest news as Houston Suburb Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Oracle E-Business Suite Bug Could Allow Remote Code Execution</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Warns of Payroll Pirates Targeting HR and Finance Systems</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/houston-suburb-cyberattack-services" rel="noopener noreferrer" target="_blank">https://therecord.media/houston-suburb-cyberattack-services</a></p><p><a href="https://www.securityweek.com/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/</a></p><p><a href="https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html</a></p><p><a href="https://www.securityweek.com/sophisticated-malware-deployed-in-oracle-ebs-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sophisticated-malware-deployed-in-oracle-ebs-zero-day-attacks/</a></p><p><a href="https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html</a></p><p><a href="https://www.securityweek.com/juniper-networks-patches-critical-junos-space-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-networks-patches-critical-junos-space-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/</a></p><p><a href="https://therecord.media/breachforums-fbi-france-takedown-banner-scattered-spider-salesforce-leak" rel="noopener noreferrer" target="_blank">https://therecord.media/breachforums-fbi-france-takedown-banner-scattered-spider-salesforce-leak</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spain-dismantles-gxc-team-cybercrime-syndicate-arrests-leader/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spain-dismantles-gxc-team-cybercrime-syndicate-arrests-leader/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 992: Today's episode will discuss the latest news as Houston Suburb Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Oracle E-Business Suite Bug Could Allow Remote Code Execution</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Warns of Payroll Pirates Targeting HR and Finance Systems</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/houston-suburb-cyberattack-services" rel="noopener noreferrer" target="_blank">https://therecord.media/houston-suburb-cyberattack-services</a></p><p><a href="https://www.securityweek.com/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/</a></p><p><a href="https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html</a></p><p><a href="https://www.securityweek.com/sophisticated-malware-deployed-in-oracle-ebs-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sophisticated-malware-deployed-in-oracle-ebs-zero-day-attacks/</a></p><p><a href="https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html</a></p><p><a href="https://www.securityweek.com/juniper-networks-patches-critical-junos-space-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-networks-patches-critical-junos-space-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/</a></p><p><a href="https://therecord.media/breachforums-fbi-france-takedown-banner-scattered-spider-salesforce-leak" rel="noopener noreferrer" target="_blank">https://therecord.media/breachforums-fbi-france-takedown-banner-scattered-spider-salesforce-leak</a></p><p><a href="https://www.bleepingcomputer.com/news/security/spain-dismantles-gxc-team-cybercrime-syndicate-arrests-leader/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/spain-dismantles-gxc-team-cybercrime-syndicate-arrests-leader/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cc17db0e-50f8-4150-ae25-abf69e63b5f5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 13 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cc17db0e-50f8-4150-ae25-abf69e63b5f5.mp3" length="7908908" type="audio/mpeg"/><itunes:duration>16:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>992</itunes:episode><podcast:episode>992</podcast:episode></item><item><title>Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen</title><itunes:title>Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen</itunes:title><description><![CDATA[<p>🎙️ Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 991: Today's episode will discuss the latest news as Chinese Hackers Hit Law Firm Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hacktivists Target Critical Infrastructure But Hit Decoy Plant Instead</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;LockBit Qilin and DragonForce Join Forces in Ransomware Collaboration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Copilot Chat Flaw Leaked Data from Private Repositories</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-breached-law-firm-williams-connolly-via-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-breached-law-firm-williams-connolly-via-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-asahi-brewery-attack-leaks-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-asahi-brewery-attack-leaks-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacktivists-target-critical-infrastructure-hit-decoy-plant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacktivists-target-critical-infrastructure-hit-decoy-plant/</a></p><p><a href="https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html</a></p><p><a href="https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/</a></p><p><a href="https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/</a></p><p><a href="https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html</a></p><p><a href="https://therecord.media/california-signs-law-opt-out-browsers" rel="noopener noreferrer" target="_blank">https://therecord.media/california-signs-law-opt-out-browsers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 991: Today's episode will discuss the latest news as Chinese Hackers Hit Law Firm Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hacktivists Target Critical Infrastructure But Hit Decoy Plant Instead</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;LockBit Qilin and DragonForce Join Forces in Ransomware Collaboration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Copilot Chat Flaw Leaked Data from Private Repositories</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-breached-law-firm-williams-connolly-via-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-breached-law-firm-williams-connolly-via-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-asahi-brewery-attack-leaks-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-asahi-brewery-attack-leaks-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacktivists-target-critical-infrastructure-hit-decoy-plant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacktivists-target-critical-infrastructure-hit-decoy-plant/</a></p><p><a href="https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html</a></p><p><a href="https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/</a></p><p><a href="https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/</a></p><p><a href="https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html</a></p><p><a href="https://therecord.media/california-signs-law-opt-out-browsers" rel="noopener noreferrer" target="_blank">https://therecord.media/california-signs-law-opt-out-browsers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1719bc61-ddeb-4a8e-9478-400f56cf37f1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 09 Oct 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1719bc61-ddeb-4a8e-9478-400f56cf37f1.mp3" length="7444460" type="audio/mpeg"/><itunes:duration>15:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>991</itunes:episode><podcast:episode>991</podcast:episode></item><item><title>Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto</title><itunes:title>Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto</itunes:title><description><![CDATA[<p>🎙️ Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 990: Today's episode will discuss the latest news as Avnet Breach Data Unreadable with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DraftKings Warns Users of Credential Stuffing Attacks on Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Hackers Stole Over $2 Billion in Crypto This Year</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Disrupts Russian North Korean Influence Operations</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/electronics-giant-avnet-confirms-breach-says-stolen-data-unreadable/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/electronics-giant-avnet-confirms-breach-says-stolen-data-unreadable/</a></p><p><a href="https://www.securityweek.com/exploitation-of-oracle-ebs-zero-day-started-2-months-before-patching/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-oracle-ebs-zero-day-started-2-months-before-patching/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/</a></p><p><a href="https://www.securityweek.com/draftkings-warns-users-of-credential-stuffing-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/draftkings-warns-users-of-credential-stuffing-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/north-korean-hackers-stole-over-2-billion-in-crypto-this-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/north-korean-hackers-stole-over-2-billion-in-crypto-this-year/</a></p><p><a href="https://thehackernews.com/2025/10/openai-disrupts-russian-north-korean.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/openai-disrupts-russian-north-korean.html</a></p><p><a href="https://therecord.media/russia-blocks-mobile-internet-foreign-sim-cards" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-blocks-mobile-internet-foreign-sim-cards</a></p><p><a href="https://www.securityweek.com/security-firm-exposes-role-of-beijing-research-institute-in-chinas-cyber-operations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-firm-exposes-role-of-beijing-research-institute-in-chinas-cyber-operations/</a></p><p><a href="https://cybersecuritynews.com/hackers-abuse-teams-features/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-abuse-teams-features/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 990: Today's episode will discuss the latest news as Avnet Breach Data Unreadable with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DraftKings Warns Users of Credential Stuffing Attacks on Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Hackers Stole Over $2 Billion in Crypto This Year</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Disrupts Russian North Korean Influence Operations</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/electronics-giant-avnet-confirms-breach-says-stolen-data-unreadable/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/electronics-giant-avnet-confirms-breach-says-stolen-data-unreadable/</a></p><p><a href="https://www.securityweek.com/exploitation-of-oracle-ebs-zero-day-started-2-months-before-patching/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-oracle-ebs-zero-day-started-2-months-before-patching/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/</a></p><p><a href="https://www.securityweek.com/draftkings-warns-users-of-credential-stuffing-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/draftkings-warns-users-of-credential-stuffing-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/north-korean-hackers-stole-over-2-billion-in-crypto-this-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/north-korean-hackers-stole-over-2-billion-in-crypto-this-year/</a></p><p><a href="https://thehackernews.com/2025/10/openai-disrupts-russian-north-korean.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/openai-disrupts-russian-north-korean.html</a></p><p><a href="https://therecord.media/russia-blocks-mobile-internet-foreign-sim-cards" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-blocks-mobile-internet-foreign-sim-cards</a></p><p><a href="https://www.securityweek.com/security-firm-exposes-role-of-beijing-research-institute-in-chinas-cyber-operations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-firm-exposes-role-of-beijing-research-institute-in-chinas-cyber-operations/</a></p><p><a href="https://cybersecuritynews.com/hackers-abuse-teams-features/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/hackers-abuse-teams-features/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at ThreatLocker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c1e5835a-b028-44b8-ac8a-8206954ddccc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 08 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c1e5835a-b028-44b8-ac8a-8206954ddccc.mp3" length="9157100" type="audio/mpeg"/><itunes:duration>19:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>990</itunes:episode><podcast:episode>990</podcast:episode></item><item><title>Discord Third-Party Breach, Red Hat ShinyHunters Extortion, Asahi Beer Ransomware Data Stolen</title><itunes:title>Discord Third-Party Breach, Red Hat ShinyHunters Extortion, Asahi Beer Ransomware Data Stolen</itunes:title><description><![CDATA[<p>🎙️ Discord Third-Party Breach, Red Hat ShinyHunters Extortion, Asahi Beer Ransomware Data Stolen</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 988: Today's episode will discuss the latest news as Oracle Extortion Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jaguar Land Rover Slowly Starts Making Cars Again After Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Critical GoAnywhere Bug Exploited in Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Redis Warns of Max Severity Flaw Impacting Thousands of Instances</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/discord-says-user-information-stolen-in-third-party-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/discord-says-user-information-stolen-in-third-party-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/</a></p><p><a href="https://www.securityweek.com/beer-giant-asahi-says-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beer-giant-asahi-says-data-stolen-in-ransomware-attack/</a></p><p><a href="https://www.bankinfosecurity.com/jaguar-land-rover-slowly-starts-making-cars-again-a-29658" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/jaguar-land-rover-slowly-starts-making-cars-again-a-29658</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/</a></p><p><a href="https://therecord.media/signal-calls-on-germany-to-vote-no-chat-control" rel="noopener noreferrer" target="_blank">https://therecord.media/signal-calls-on-germany-to-vote-no-chat-control</a></p><p><a href="https://www.securityweek.com/4-5-million-offered-in-new-cloud-hacking-competition/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/4-5-million-offered-in-new-cloud-hacking-competition/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Discord Third-Party Breach, Red Hat ShinyHunters Extortion, Asahi Beer Ransomware Data Stolen</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 988: Today's episode will discuss the latest news as Oracle Extortion Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Jaguar Land Rover Slowly Starts Making Cars Again After Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Critical GoAnywhere Bug Exploited in Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Redis Warns of Max Severity Flaw Impacting Thousands of Instances</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/discord-says-user-information-stolen-in-third-party-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/discord-says-user-information-stolen-in-third-party-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/</a></p><p><a href="https://www.securityweek.com/beer-giant-asahi-says-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beer-giant-asahi-says-data-stolen-in-ransomware-attack/</a></p><p><a href="https://www.bankinfosecurity.com/jaguar-land-rover-slowly-starts-making-cars-again-a-29658" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/jaguar-land-rover-slowly-starts-making-cars-again-a-29658</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/</a></p><p><a href="https://therecord.media/signal-calls-on-germany-to-vote-no-chat-control" rel="noopener noreferrer" target="_blank">https://therecord.media/signal-calls-on-germany-to-vote-no-chat-control</a></p><p><a href="https://www.securityweek.com/4-5-million-offered-in-new-cloud-hacking-competition/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/4-5-million-offered-in-new-cloud-hacking-competition/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">af7195e9-62c9-4aa6-b238-d8539bc4cf1a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 07 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/af7195e9-62c9-4aa6-b238-d8539bc4cf1a.mp3" length="7262252" type="audio/mpeg"/><itunes:duration>15:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>989</itunes:episode><podcast:episode>989</podcast:episode></item><item><title>Oracle Extortion Attacks, Red Hat GitLab Hacked, ParkMobile $1 Per Victim Settlement</title><itunes:title>Oracle Extortion Attacks, Red Hat GitLab Hacked, ParkMobile $1 Per Victim Settlement</itunes:title><description><![CDATA[<p>🎙️ Oracle Extortion Attacks, Red Hat GitLab Hacked, ParkMobile $1 Per Victim Settlement</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 987: Today's episode will discuss the latest news as Oracle Extortion Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Lapsus Hunters Continue Targeting Salesforce Victims</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salesforce Scattered Spider Extortion Site Actively Targeting Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Surge in Scans Targeting Palo Alto Networks Login Portals</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/parkmobile-pays-1-each-for-2021-data-breach-that-hit-22-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/parkmobile-pays-1-each-for-2021-data-breach-that-hit-22-million/</a></p><p><a href="https://www.securityweek.com/red-hat-confirms-gitlab-instance-hack-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/red-hat-confirms-gitlab-instance-hack-data-theft/</a></p><p><a href="https://thecyberexpress.com/scattered-lapsus-hunters-salesforce-victims/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/scattered-lapsus-hunters-salesforce-victims/</a></p><p><a href="https://therecord.media/salesforce-scattered-spider-extortion-site" rel="noopener noreferrer" target="_blank">https://therecord.media/salesforce-scattered-spider-extortion-site</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-surge-in-scans-targeting-palo-alto-networks-login-portals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-surge-in-scans-targeting-palo-alto-networks-login-portals/</a></p><p><a href="https://www.securityweek.com/chrome-141-and-firefox-143-patches-fix-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-141-and-firefox-143-patches-fix-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-zimbra-flaw-as-zero-day-using-icalendar-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploited-zimbra-flaw-as-zero-day-using-icalendar-files/</a></p><p><a href="https://www.securityweek.com/many-attacks-aimed-at-eu-targeted-ot-says-cybersecurity-agency/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/many-attacks-aimed-at-eu-targeted-ot-says-cybersecurity-agency/</a></p><p><a href="https://therecord.media/linkedin-sues-data-scraping-company" rel="noopener noreferrer" target="_blank">https://therecord.media/linkedin-sues-data-scraping-company</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Oracle Extortion Attacks, Red Hat GitLab Hacked, ParkMobile $1 Per Victim Settlement</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 987: Today's episode will discuss the latest news as Oracle Extortion Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Lapsus Hunters Continue Targeting Salesforce Victims</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salesforce Scattered Spider Extortion Site Actively Targeting Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Surge in Scans Targeting Palo Alto Networks Login Portals</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/parkmobile-pays-1-each-for-2021-data-breach-that-hit-22-million/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/parkmobile-pays-1-each-for-2021-data-breach-that-hit-22-million/</a></p><p><a href="https://www.securityweek.com/red-hat-confirms-gitlab-instance-hack-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/red-hat-confirms-gitlab-instance-hack-data-theft/</a></p><p><a href="https://thecyberexpress.com/scattered-lapsus-hunters-salesforce-victims/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/scattered-lapsus-hunters-salesforce-victims/</a></p><p><a href="https://therecord.media/salesforce-scattered-spider-extortion-site" rel="noopener noreferrer" target="_blank">https://therecord.media/salesforce-scattered-spider-extortion-site</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-surge-in-scans-targeting-palo-alto-networks-login-portals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-surge-in-scans-targeting-palo-alto-networks-login-portals/</a></p><p><a href="https://www.securityweek.com/chrome-141-and-firefox-143-patches-fix-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-141-and-firefox-143-patches-fix-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-zimbra-flaw-as-zero-day-using-icalendar-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploited-zimbra-flaw-as-zero-day-using-icalendar-files/</a></p><p><a href="https://www.securityweek.com/many-attacks-aimed-at-eu-targeted-ot-says-cybersecurity-agency/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/many-attacks-aimed-at-eu-targeted-ot-says-cybersecurity-agency/</a></p><p><a href="https://therecord.media/linkedin-sues-data-scraping-company" rel="noopener noreferrer" target="_blank">https://therecord.media/linkedin-sues-data-scraping-company</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">367d9d58-f906-425f-9924-5692fc533453</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 06 Oct 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/367d9d58-f906-425f-9924-5692fc533453.mp3" length="24535987" type="audio/mpeg"/><itunes:duration>17:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>988</itunes:episode><podcast:episode>988</podcast:episode></item><item><title>WestJet Customer Data Stolen, Afghanistan Internet Blackout, Broadcom Hides VMware Zero-Day</title><itunes:title>WestJet Customer Data Stolen, Afghanistan Internet Blackout, Broadcom Hides VMware Zero-Day</itunes:title><description><![CDATA[<p>🎙️ WestJet Customer Data Stolen, Afghanistan Internet Blackout, Broadcom Hides VMware Zero-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 987: Today's episode will discuss the latest news as Beer Giant Asahi Production Disrupted with more news below:</p><p>·&nbsp;CISA 2015 State Cyber Grants Lapse as Congress Faces Government Shutdown</p><p>·&nbsp;Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability</p><p>·&nbsp;Hackers Exploit Milesight Routers to Deploy Malware in IoT Attacks</p><p>&nbsp;</p><p>✅ Story Links:</p><p><a href="https://www.securityweek.com/canadian-airline-westjet-says-hackers-stole-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-airline-westjet-says-hackers-stole-customer-data/</a></p><p><a href="https://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout" rel="noopener noreferrer" target="_blank">https://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout</a></p><p><a href="https://therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown</a></p><p><a href="https://www.securityweek.com/broadcom-fails-to-disclose-zero-day-exploitation-of-vmware-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-fails-to-disclose-zero-day-exploitation-of-vmware-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html</a></p><p><a href="https://www.securityweek.com/google-patches-gemini-ai-hacks-involving-poisoned-logs-search-results/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-gemini-ai-hacks-involving-poisoned-logs-search-results/</a></p><p><a href="https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html</a></p><p><a href="https://therecord.media/ccpa-tractor-supply-privacy-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/ccpa-tractor-supply-privacy-fine</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/sendit-sued-by-the-ftc-for-illegal-collection-of-children-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/sendit-sued-by-the-ftc-for-illegal-collection-of-children-data/</a></p><p>&nbsp;</p><p>👀 SHOW Supporters:</p><p>Today's episode is supported by our friends at Threat Locker. https://www.threatlocker.com/cyberhub</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1&nbsp;</p><p>&nbsp;</p><p>🚨 Important Links to Follow:</p><p>👉Website: https://www.cyberhubpodcast.com/</p><p>👉Listen here: https://linktr.ee/cyberhubpodcast&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/</p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/</p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast</p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast</p><p>&nbsp;</p><p>🤝 For Business Inquiries:&nbsp;info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching:</p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share</p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p>https://youtu.be/Q9Hp5beyF18</p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;</p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;</p><p>https://www.youtube.com/watch?v=xBJDDN8djU0</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p>&nbsp;=============================</p><p>🚀 About The CyberHub Podcast.</p><p>The Hub of the Infosec Community.</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:&nbsp;info@cyberhubpodcast.com</p><p>================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ WestJet Customer Data Stolen, Afghanistan Internet Blackout, Broadcom Hides VMware Zero-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 987: Today's episode will discuss the latest news as Beer Giant Asahi Production Disrupted with more news below:</p><p>·&nbsp;CISA 2015 State Cyber Grants Lapse as Congress Faces Government Shutdown</p><p>·&nbsp;Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability</p><p>·&nbsp;Hackers Exploit Milesight Routers to Deploy Malware in IoT Attacks</p><p>&nbsp;</p><p>✅ Story Links:</p><p><a href="https://www.securityweek.com/canadian-airline-westjet-says-hackers-stole-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-airline-westjet-says-hackers-stole-customer-data/</a></p><p><a href="https://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout" rel="noopener noreferrer" target="_blank">https://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout</a></p><p><a href="https://therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown</a></p><p><a href="https://www.securityweek.com/broadcom-fails-to-disclose-zero-day-exploitation-of-vmware-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-fails-to-disclose-zero-day-exploitation-of-vmware-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html</a></p><p><a href="https://www.securityweek.com/google-patches-gemini-ai-hacks-involving-poisoned-logs-search-results/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-gemini-ai-hacks-involving-poisoned-logs-search-results/</a></p><p><a href="https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html</a></p><p><a href="https://therecord.media/ccpa-tractor-supply-privacy-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/ccpa-tractor-supply-privacy-fine</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/sendit-sued-by-the-ftc-for-illegal-collection-of-children-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/sendit-sued-by-the-ftc-for-illegal-collection-of-children-data/</a></p><p>&nbsp;</p><p>👀 SHOW Supporters:</p><p>Today's episode is supported by our friends at Threat Locker. https://www.threatlocker.com/cyberhub</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1&nbsp;</p><p>&nbsp;</p><p>🚨 Important Links to Follow:</p><p>👉Website: https://www.cyberhubpodcast.com/</p><p>👉Listen here: https://linktr.ee/cyberhubpodcast&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/</p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/</p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast</p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast</p><p>&nbsp;</p><p>🤝 For Business Inquiries:&nbsp;info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching:</p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share</p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p>https://youtu.be/Q9Hp5beyF18</p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;</p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;</p><p>https://www.youtube.com/watch?v=xBJDDN8djU0</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p>&nbsp;=============================</p><p>🚀 About The CyberHub Podcast.</p><p>The Hub of the Infosec Community.</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:&nbsp;info@cyberhubpodcast.com</p><p>================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2520a12c-c6ff-43f9-8a2b-176c63bf0f4c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 01 Oct 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2520a12c-c6ff-43f9-8a2b-176c63bf0f4c.mp3" length="27649267" type="audio/mpeg"/><itunes:duration>19:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>987</itunes:episode><podcast:episode>987</podcast:episode></item><item><title>Beer Giant Asahi Production Disrupted, Ransomware Gang Sought BBC Reporter Help, OneBlood $1M Settlement</title><itunes:title>Beer Giant Asahi Production Disrupted, Ransomware Gang Sought BBC Reporter Help, OneBlood $1M Settlement</itunes:title><description><![CDATA[<p>🎙️ Beer Giant Asahi Production Disrupted, Ransomware Gang Sought BBC Reporter Help, OneBlood $1M Settlement</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 986: Today's episode will discuss the latest news as Beer Giant Asahi Production Disrupted with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched in VMware Aria Operations NSX vCenter</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;California Gov Gavin Newsom Signs Bill Creating AI Safety Measures</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Government Shutdown Plan Addresses Employee Continuity</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-on-beer-giant-asahi-disrupts-production/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-on-beer-giant-asahi-disrupts-production/</a></p><p><a href="https://therecord.media/chinese-scammer-guilty-seizure-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-scammer-guilty-seizure-uk</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/</a></p><p><a href="https://www.bankinfosecurity.com/oneblood-agrees-to-pay-1m-settlement-in-ransomware-hack-a-29593" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/oneblood-agrees-to-pay-1m-settlement-in-ransomware-hack-a-29593</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-vmware-aria-operations-nsx-vcenter/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-vmware-aria-operations-nsx-vcenter/</a></p><p><a href="https://www.securityweek.com/california-gov-gavin-newsom-signs-bill-creating-ai-safety-measures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/california-gov-gavin-newsom-signs-bill-creating-ai-safety-measures/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-government-shutdown-plan-employees/761365/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-government-shutdown-plan-employees/761365/</a></p><p><a href="https://thecyberexpress.com/cve-2021-21311-added-to-cisa-kev/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2021-21311-added-to-cisa-kev/</a></p><p><a href="https://www.bankinfosecurity.com/ot-operators-urged-to-map-networks-or-risk-major-blind-spots-a-29596" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ot-operators-urged-to-map-networks-or-risk-major-blind-spots-a-29596</a></p><p><a href="https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html</a></p><p><a href="https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Beer Giant Asahi Production Disrupted, Ransomware Gang Sought BBC Reporter Help, OneBlood $1M Settlement</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 986: Today's episode will discuss the latest news as Beer Giant Asahi Production Disrupted with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched in VMware Aria Operations NSX vCenter</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;California Gov Gavin Newsom Signs Bill Creating AI Safety Measures</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Government Shutdown Plan Addresses Employee Continuity</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-on-beer-giant-asahi-disrupts-production/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-on-beer-giant-asahi-disrupts-production/</a></p><p><a href="https://therecord.media/chinese-scammer-guilty-seizure-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-scammer-guilty-seizure-uk</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/</a></p><p><a href="https://www.bankinfosecurity.com/oneblood-agrees-to-pay-1m-settlement-in-ransomware-hack-a-29593" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/oneblood-agrees-to-pay-1m-settlement-in-ransomware-hack-a-29593</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-vmware-aria-operations-nsx-vcenter/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-vmware-aria-operations-nsx-vcenter/</a></p><p><a href="https://www.securityweek.com/california-gov-gavin-newsom-signs-bill-creating-ai-safety-measures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/california-gov-gavin-newsom-signs-bill-creating-ai-safety-measures/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-government-shutdown-plan-employees/761365/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-government-shutdown-plan-employees/761365/</a></p><p><a href="https://thecyberexpress.com/cve-2021-21311-added-to-cisa-kev/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2021-21311-added-to-cisa-kev/</a></p><p><a href="https://www.bankinfosecurity.com/ot-operators-urged-to-map-networks-or-risk-major-blind-spots-a-29596" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ot-operators-urged-to-map-networks-or-risk-major-blind-spots-a-29596</a></p><p><a href="https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html</a></p><p><a href="https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">54fd63b1-d162-4ecc-a138-369d23b11b2d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 30 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/54fd63b1-d162-4ecc-a138-369d23b11b2d.mp3" length="28782260" type="audio/mpeg"/><itunes:duration>19:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>986</itunes:episode><podcast:episode>986</podcast:episode></item><item><title>UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days</title><itunes:title>UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days</itunes:title><description><![CDATA[<p>🎙️ UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 985: Today's episode will discuss the latest news as UK Gov $1.5B JLR Intervention with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;British Department Store Harrods Warns Customers of Personal Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ohio Ransomware Attack Impacts 45,000 Residents with Data Compromise</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-on-jlr-prompts-1-5-billion-uk-government-intervention/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-on-jlr-prompts-1-5-billion-uk-government-intervention/</a></p><p><a href="https://therecord.media/retailer-the-co-op-cyberattack-lost-revenue" rel="noopener noreferrer" target="_blank">https://therecord.media/retailer-the-co-op-cyberattack-lost-revenue</a></p><p><a href="https://www.cybersecuritydive.com/news/rtx-hack-passenger-boarding-software-ransomware/761265/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/rtx-hack-passenger-boarding-software-ransomware/761265/</a></p><p><a href="https://www.securityweek.com/british-department-store-harrods-warns-customers-that-some-personal-details-taken-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/british-department-store-harrods-warns-customers-that-some-personal-details-taken-in-data-breach/</a></p><p><a href="https://therecord.media/ohio-ransomware-attack-impacts-45000" rel="noopener noreferrer" target="_blank">https://therecord.media/ohio-ransomware-attack-impacts-45000</a></p><p><a href="https://www.securityweek.com/cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks/</a></p><p><a href="https://thecyberexpress.com/project-zero-exposes-aslr-bypass/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/project-zero-exposes-aslr-bypass/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/government/us-investors-to-take-over-tiktok-operations-in-the-country/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/government/us-investors-to-take-over-tiktok-operations-in-the-country/</a></p><p><a href="https://www.securityweek.com/dutch-teens-arrested-for-allegedly-helping-russian-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dutch-teens-arrested-for-allegedly-helping-russian-hackers/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 985: Today's episode will discuss the latest news as UK Gov $1.5B JLR Intervention with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;British Department Store Harrods Warns Customers of Personal Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ohio Ransomware Attack Impacts 45,000 Residents with Data Compromise</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-on-jlr-prompts-1-5-billion-uk-government-intervention/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-on-jlr-prompts-1-5-billion-uk-government-intervention/</a></p><p><a href="https://therecord.media/retailer-the-co-op-cyberattack-lost-revenue" rel="noopener noreferrer" target="_blank">https://therecord.media/retailer-the-co-op-cyberattack-lost-revenue</a></p><p><a href="https://www.cybersecuritydive.com/news/rtx-hack-passenger-boarding-software-ransomware/761265/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/rtx-hack-passenger-boarding-software-ransomware/761265/</a></p><p><a href="https://www.securityweek.com/british-department-store-harrods-warns-customers-that-some-personal-details-taken-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/british-department-store-harrods-warns-customers-that-some-personal-details-taken-in-data-breach/</a></p><p><a href="https://therecord.media/ohio-ransomware-attack-impacts-45000" rel="noopener noreferrer" target="_blank">https://therecord.media/ohio-ransomware-attack-impacts-45000</a></p><p><a href="https://www.securityweek.com/cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks/</a></p><p><a href="https://thecyberexpress.com/project-zero-exposes-aslr-bypass/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/project-zero-exposes-aslr-bypass/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/government/us-investors-to-take-over-tiktok-operations-in-the-country/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/government/us-investors-to-take-over-tiktok-operations-in-the-country/</a></p><p><a href="https://www.securityweek.com/dutch-teens-arrested-for-allegedly-helping-russian-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dutch-teens-arrested-for-allegedly-helping-russian-hackers/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">853b6af3-965d-41d7-b429-61830a353304</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 29 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/853b6af3-965d-41d7-b429-61830a353304.mp3" length="27585332" type="audio/mpeg"/><itunes:duration>19:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>985</itunes:episode><podcast:episode>985</podcast:episode></item><item><title>Europe Airport Ransomware Suspect Arrested, UN Telecom Threat Stopped, JLR Extends Shutdown Again</title><itunes:title>Europe Airport Ransomware Suspect Arrested, UN Telecom Threat Stopped, JLR Extends Shutdown Again</itunes:title><description><![CDATA[<p>🎙️ Europe Airport Ransomware Suspect Arrested, UN Telecom Threat Stopped, JLR Extends Shutdown Again</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 984: Today's episode will discuss the latest news as Europe Airport Ransomware Suspect Arrested with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google BrickStorm Malware Used to Steal US Organizations Data for Over a Year</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Hackers RedNovember Target Government and Military Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Target Casino Operator Boyd Gaming in New Attack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/european-airport-cyberattack-linked-to-obscure-ransomware-suspect-arrested/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/european-airport-cyberattack-linked-to-obscure-ransomware-suspect-arrested/</a></p><p><a href="https://www.securityweek.com/a-massive-telecom-threat-was-stopped-right-as-world-leaders-gathered-at-un-headquarters-in-new-york/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/a-massive-telecom-threat-was-stopped-right-as-world-leaders-gathered-at-un-headquarters-in-new-york/</a></p><p><a href="https://therecord.media/jaguar-land-rover-extends-shutdown-again-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-extends-shutdown-again-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-brickstorm-malware-used-to-steal-us-orgs-data-for-over-a-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-brickstorm-malware-used-to-steal-us-orgs-data-for-over-a-year/</a></p><p><a href="https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html</a></p><p><a href="https://www.securityweek.com/hackers-target-casino-operator-boyd-gaming/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-casino-operator-boyd-gaming/</a></p><p><a href="https://www.securityweek.com/geoserver-flaw-exploited-in-us-federal-agency-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/geoserver-flaw-exploited-in-us-federal-agency-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-ios-zero-day-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-ios-zero-day-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/09/github-mandates-2fa-and-short-lived.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/github-mandates-2fa-and-short-lived.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-dependency-checks--shai-hulud-compromise/761018/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-dependency-checks--shai-hulud-compromise/761018/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/</a></p><p><a href="https://therecord.media/anti-fraud-interpol-crackdown-recovers-over-400-million" rel="noopener noreferrer" target="_blank">https://therecord.media/anti-fraud-interpol-crackdown-recovers-over-400-million</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Europe Airport Ransomware Suspect Arrested, UN Telecom Threat Stopped, JLR Extends Shutdown Again</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 984: Today's episode will discuss the latest news as Europe Airport Ransomware Suspect Arrested with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google BrickStorm Malware Used to Steal US Organizations Data for Over a Year</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Hackers RedNovember Target Government and Military Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Target Casino Operator Boyd Gaming in New Attack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/european-airport-cyberattack-linked-to-obscure-ransomware-suspect-arrested/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/european-airport-cyberattack-linked-to-obscure-ransomware-suspect-arrested/</a></p><p><a href="https://www.securityweek.com/a-massive-telecom-threat-was-stopped-right-as-world-leaders-gathered-at-un-headquarters-in-new-york/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/a-massive-telecom-threat-was-stopped-right-as-world-leaders-gathered-at-un-headquarters-in-new-york/</a></p><p><a href="https://therecord.media/jaguar-land-rover-extends-shutdown-again-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-extends-shutdown-again-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-brickstorm-malware-used-to-steal-us-orgs-data-for-over-a-year/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-brickstorm-malware-used-to-steal-us-orgs-data-for-over-a-year/</a></p><p><a href="https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html</a></p><p><a href="https://www.securityweek.com/hackers-target-casino-operator-boyd-gaming/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-casino-operator-boyd-gaming/</a></p><p><a href="https://www.securityweek.com/geoserver-flaw-exploited-in-us-federal-agency-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/geoserver-flaw-exploited-in-us-federal-agency-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-ios-zero-day-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-ios-zero-day-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/</a></p><p><a href="https://thehackernews.com/2025/09/github-mandates-2fa-and-short-lived.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/github-mandates-2fa-and-short-lived.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-dependency-checks--shai-hulud-compromise/761018/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-dependency-checks--shai-hulud-compromise/761018/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/</a></p><p><a href="https://therecord.media/anti-fraud-interpol-crackdown-recovers-over-400-million" rel="noopener noreferrer" target="_blank">https://therecord.media/anti-fraud-interpol-crackdown-recovers-over-400-million</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0271089f-061a-4604-adc0-662b30a92fb3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 25 Sep 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0271089f-061a-4604-adc0-662b30a92fb3.mp3" length="35151092" type="audio/mpeg"/><itunes:duration>24:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>984</itunes:episode><podcast:episode>984</podcast:episode></item><item><title>Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests</title><itunes:title>Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests</itunes:title><description><![CDATA[<p>🎙️ <strong>Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests</strong></p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 983: Today's episode will discuss the latest news as <strong>Airport Cyberattack Disrupts Europe Flights</strong> with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Spy Groups Turla Gamaredon Target Ukraine in Coordinated Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DPRK Hackers Use ClickFix to Deliver Advanced Malware Payloads</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Exposes Malware Kits Deployed in Ivanti EPMM Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/airport-cyberattack-disrupts-more-flights-across-europe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/airport-cyberattack-disrupts-more-flights-across-europe/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-entra-id-flaw-allowed-hijacking-any-companys-tenant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-entra-id-flaw-allowed-hijacking-any-companys-tenant/</a></p><p><a href="https://www.securityweek.com/widespread-infostealer-campaign-targeting-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/widespread-infostealer-campaign-targeting-macos-users/</a></p><p><a href="https://therecord.media/russian-spy-groups-turla-gamaredon-target-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-spy-groups-turla-gamaredon-target-ukraine</a></p><p><a href="https://thehackernews.com/2025/09/dprk-hackers-use-clickfix-to-deliver.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/dprk-hackers-use-clickfix-to-deliver.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-exposes-malware-kits-deployed-in-ivanti-epmm-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-exposes-malware-kits-deployed-in-ivanti-epmm-attacks/</a></p><p><a href="https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-fbi-crime-complaint-portals-used-for-cybercrime/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-fbi-crime-complaint-portals-used-for-cybercrime/</a></p><p><a href="https://therecord.media/mi6-darkweb-portal-recruit-foreign-spies" rel="noopener noreferrer" target="_blank">https://therecord.media/mi6-darkweb-portal-recruit-foreign-spies</a></p><p><a href="https://www.securityweek.com/two-scattered-spider-suspects-arrested-in-uk-one-charged-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-scattered-spider-suspects-arrested-in-uk-one-charged-in-us/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ <strong>Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests</strong></p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 983: Today's episode will discuss the latest news as <strong>Airport Cyberattack Disrupts Europe Flights</strong> with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Spy Groups Turla Gamaredon Target Ukraine in Coordinated Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DPRK Hackers Use ClickFix to Deliver Advanced Malware Payloads</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Exposes Malware Kits Deployed in Ivanti EPMM Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/airport-cyberattack-disrupts-more-flights-across-europe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/airport-cyberattack-disrupts-more-flights-across-europe/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-entra-id-flaw-allowed-hijacking-any-companys-tenant/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-entra-id-flaw-allowed-hijacking-any-companys-tenant/</a></p><p><a href="https://www.securityweek.com/widespread-infostealer-campaign-targeting-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/widespread-infostealer-campaign-targeting-macos-users/</a></p><p><a href="https://therecord.media/russian-spy-groups-turla-gamaredon-target-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-spy-groups-turla-gamaredon-target-ukraine</a></p><p><a href="https://thehackernews.com/2025/09/dprk-hackers-use-clickfix-to-deliver.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/dprk-hackers-use-clickfix-to-deliver.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-exposes-malware-kits-deployed-in-ivanti-epmm-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-exposes-malware-kits-deployed-in-ivanti-epmm-attacks/</a></p><p><a href="https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-fbi-crime-complaint-portals-used-for-cybercrime/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-fbi-crime-complaint-portals-used-for-cybercrime/</a></p><p><a href="https://therecord.media/mi6-darkweb-portal-recruit-foreign-spies" rel="noopener noreferrer" target="_blank">https://therecord.media/mi6-darkweb-portal-recruit-foreign-spies</a></p><p><a href="https://www.securityweek.com/two-scattered-spider-suspects-arrested-in-uk-one-charged-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-scattered-spider-suspects-arrested-in-uk-one-charged-in-us/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">930ef77d-097b-4393-8d45-7423e2814dd1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 22 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/930ef77d-097b-4393-8d45-7423e2814dd1.mp3" length="27583604" type="audio/mpeg"/><itunes:duration>19:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>983</itunes:episode><podcast:episode>983</podcast:episode></item><item><title>JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach</title><itunes:title>JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach</itunes:title><description><![CDATA[<p>🎙️ JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 982: Today's episode will discuss the latest news as JLR Cyber Shockwave Hits Auto Sector with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Kimsuky Hackers Use Phishing with Fake Military IDs and ChatGPT</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oliver Steadman Charged with Alleged Honeypot Blackmail of Britain Politicians</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jlr-cyber-shockwave-auto-sector" rel="noopener noreferrer" target="_blank">https://therecord.media/jlr-cyber-shockwave-auto-sector</a></p><p><a href="https://www.cybersecuritydive.com/news/bridgestone-americas-restores-facilities-network-connections-following-cyb/760381/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/bridgestone-americas-restores-facilities-network-connections-following-cyb/760381/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/</a></p><p><a href="https://www.securityweek.com/details-emerge-on-chinese-hacking-operation-impersonating-us-lawmaker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/details-emerge-on-chinese-hacking-operation-impersonating-us-lawmaker/</a></p><p><a href="https://therecord.media/north-korea-kimsuky-hackers-phishing-fake-military-ids-chatgpt" rel="noopener noreferrer" target="_blank">https://therecord.media/north-korea-kimsuky-hackers-phishing-fake-military-ids-chatgpt</a></p><p><a href="https://therecord.media/oliver-steadman-charged-alleged-honeypot-blackmail-britain-politicians" rel="noopener noreferrer" target="_blank">https://therecord.media/oliver-steadman-charged-alleged-honeypot-blackmail-britain-politicians</a></p><p><a href="https://www.securityweek.com/security-industry-skeptical-of-scattered-spider-shinyhunters-retirement-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-industry-skeptical-of-scattered-spider-shinyhunters-retirement-claims/</a></p><p><a href="https://therecord.media/judge-rejects-meta-attempt-overturn-flo-privacy-lawsuit" rel="noopener noreferrer" target="_blank">https://therecord.media/judge-rejects-meta-attempt-overturn-flo-privacy-lawsuit</a></p><p><a href="https://www.bankinfosecurity.com/remedio-secures-65m-to-tackle-patch-vulnerability-gaps-a-29472" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/remedio-secures-65m-to-tackle-patch-vulnerability-gaps-a-29472</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 982: Today's episode will discuss the latest news as JLR Cyber Shockwave Hits Auto Sector with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Kimsuky Hackers Use Phishing with Fake Military IDs and ChatGPT</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oliver Steadman Charged with Alleged Honeypot Blackmail of Britain Politicians</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jlr-cyber-shockwave-auto-sector" rel="noopener noreferrer" target="_blank">https://therecord.media/jlr-cyber-shockwave-auto-sector</a></p><p><a href="https://www.cybersecuritydive.com/news/bridgestone-americas-restores-facilities-network-connections-following-cyb/760381/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/bridgestone-americas-restores-facilities-network-connections-following-cyb/760381/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/</a></p><p><a href="https://www.securityweek.com/details-emerge-on-chinese-hacking-operation-impersonating-us-lawmaker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/details-emerge-on-chinese-hacking-operation-impersonating-us-lawmaker/</a></p><p><a href="https://therecord.media/north-korea-kimsuky-hackers-phishing-fake-military-ids-chatgpt" rel="noopener noreferrer" target="_blank">https://therecord.media/north-korea-kimsuky-hackers-phishing-fake-military-ids-chatgpt</a></p><p><a href="https://therecord.media/oliver-steadman-charged-alleged-honeypot-blackmail-britain-politicians" rel="noopener noreferrer" target="_blank">https://therecord.media/oliver-steadman-charged-alleged-honeypot-blackmail-britain-politicians</a></p><p><a href="https://www.securityweek.com/security-industry-skeptical-of-scattered-spider-shinyhunters-retirement-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-industry-skeptical-of-scattered-spider-shinyhunters-retirement-claims/</a></p><p><a href="https://therecord.media/judge-rejects-meta-attempt-overturn-flo-privacy-lawsuit" rel="noopener noreferrer" target="_blank">https://therecord.media/judge-rejects-meta-attempt-overturn-flo-privacy-lawsuit</a></p><p><a href="https://www.bankinfosecurity.com/remedio-secures-65m-to-tackle-patch-vulnerability-gaps-a-29472" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/remedio-secures-65m-to-tackle-patch-vulnerability-gaps-a-29472</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">26803f0b-c4a9-49fe-912f-025f32f441ef</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 18 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/26803f0b-c4a9-49fe-912f-025f32f441ef.mp3" length="28392308" type="audio/mpeg"/><itunes:duration>19:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>982</itunes:episode><podcast:episode>982</podcast:episode></item><item><title>Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse</title><itunes:title>Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse</itunes:title><description><![CDATA[<p>🎙️ Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 981: Today's episode will discuss the latest news as Jaguar Land Rover Week 2 Shutdown with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple Rolls Out iOS 26 macOS Tahoe 26 with Patches for Over 50 Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Delays Cyber Reporting Rule to Reduce Scope and Burden</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Lawmakers Move to Extend Two Critical Cyber Laws</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack</a></p><p><a href="https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html</a></p><p><a href="https://www.securityweek.com/chatgpts-new-calendar-integration-can-be-abused-to-steal-emails/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chatgpts-new-calendar-integration-can-be-abused-to-steal-emails/</a></p><p><a href="https://thehackernews.com/2025/09/chaos-mesh-critical-graphql-flaws.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/chaos-mesh-critical-graphql-flaws.html</a></p><p><a href="https://www.securityweek.com/apple-rolls-out-ios-26-macos-tahoe-26-with-patches-for-over-50-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-rolls-out-ios-26-macos-tahoe-26-with-patches-for-over-50-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/cisa-delays-cyber-reporting-rule-to-reduce-scope-burden-a-29449" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cisa-delays-cyber-reporting-rule-to-reduce-scope-burden-a-29449</a></p><p><a href="https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws</a></p><p><a href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-admin-resentenced-to-three-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-admin-resentenced-to-three-years-in-prison/</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-pangea-to-launch-ai-detection-and-response-aidr/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-pangea-to-launch-ai-detection-and-response-aidr/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>&nbsp;#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 981: Today's episode will discuss the latest news as Jaguar Land Rover Week 2 Shutdown with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple Rolls Out iOS 26 macOS Tahoe 26 with Patches for Over 50 Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Delays Cyber Reporting Rule to Reduce Scope and Burden</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Lawmakers Move to Extend Two Critical Cyber Laws</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack</a></p><p><a href="https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html</a></p><p><a href="https://www.securityweek.com/chatgpts-new-calendar-integration-can-be-abused-to-steal-emails/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chatgpts-new-calendar-integration-can-be-abused-to-steal-emails/</a></p><p><a href="https://thehackernews.com/2025/09/chaos-mesh-critical-graphql-flaws.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/chaos-mesh-critical-graphql-flaws.html</a></p><p><a href="https://www.securityweek.com/apple-rolls-out-ios-26-macos-tahoe-26-with-patches-for-over-50-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-rolls-out-ios-26-macos-tahoe-26-with-patches-for-over-50-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/cisa-delays-cyber-reporting-rule-to-reduce-scope-burden-a-29449" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cisa-delays-cyber-reporting-rule-to-reduce-scope-burden-a-29449</a></p><p><a href="https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws</a></p><p><a href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-admin-resentenced-to-three-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-admin-resentenced-to-three-years-in-prison/</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-pangea-to-launch-ai-detection-and-response-aidr/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-pangea-to-launch-ai-detection-and-response-aidr/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>&nbsp;#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c575182a-af8d-4480-9f10-41c43fcb40e8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 17 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c575182a-af8d-4480-9f10-41c43fcb40e8.mp3" length="25927604" type="audio/mpeg"/><itunes:duration>18:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>981</itunes:episode><podcast:episode>981</podcast:episode></item><item><title>Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware</title><itunes:title>Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware</itunes:title><description><![CDATA[<p>🎙️ Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 980: Today's episode will discuss the latest news as Ukraine DDoS Russian Election with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China's Internet Watchdog Mandates 1-Hour Reporting for Serious Cybersecurity Incidents</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;HiddenGh0st WinOS and KKRat Exploit SEO Poisoning in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI-Powered Villager Pen Testing Tool Released for Security Research</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ukraine-claims-ddos-attack-russian-election-system" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-claims-ddos-attack-russian-election-system</a></p><p><a href="https://cyberpress.org/data-leak-reveals-500gb-great-firewall/" rel="noopener noreferrer" target="_blank">https://cyberpress.org/data-leak-reveals-500gb-great-firewall/</a></p><p><a href="https://gfw.report/blog/geedge_and_mesa_leak/en/" rel="noopener noreferrer" target="_blank">https://gfw.report/blog/geedge_and_mesa_leak/en/</a></p><p><a href="https://www.scmp.com/news/china/politics/article/3325596/chinas-internet-watchdog-mandates-1-hour-reporting-serious-cybersecurity-incidents" rel="noopener noreferrer" target="_blank">https://www.scmp.com/news/china/politics/article/3325596/chinas-internet-watchdog-mandates-1-hour-reporting-serious-cybersecurity-incidents</a></p><p><a href="https://thehackernews.com/2025/09/hiddengh0st-winos-and-kkrat-exploit-seo.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/hiddengh0st-winos-and-kkrat-exploit-seo.html</a></p><p><a href="https://thehackernews.com/2025/09/ai-powered-villager-pen-testing-tool.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/ai-powered-villager-pen-testing-tool.html</a></p><p><a href="https://www.securityweek.com/689000-affected-by-insider-breach-at-finwise-bank/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/689000-affected-by-insider-breach-at-finwise-bank/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-confirms-fraudulent-account-created-in-law-enforcement-portal/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-confirms-fraudulent-account-created-in-law-enforcement-portal/</a></p><p><a href="https://therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/</a></p><p><a href="https://federalnewsnetwork.com/cybersecurity/2025/09/pentagon-to-roll-out-new-rmf-by-end-of-november/" rel="noopener noreferrer" target="_blank">https://federalnewsnetwork.com/cybersecurity/2025/09/pentagon-to-roll-out-new-rmf-by-end-of-november/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 980: Today's episode will discuss the latest news as Ukraine DDoS Russian Election with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China's Internet Watchdog Mandates 1-Hour Reporting for Serious Cybersecurity Incidents</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;HiddenGh0st WinOS and KKRat Exploit SEO Poisoning in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI-Powered Villager Pen Testing Tool Released for Security Research</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ukraine-claims-ddos-attack-russian-election-system" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-claims-ddos-attack-russian-election-system</a></p><p><a href="https://cyberpress.org/data-leak-reveals-500gb-great-firewall/" rel="noopener noreferrer" target="_blank">https://cyberpress.org/data-leak-reveals-500gb-great-firewall/</a></p><p><a href="https://gfw.report/blog/geedge_and_mesa_leak/en/" rel="noopener noreferrer" target="_blank">https://gfw.report/blog/geedge_and_mesa_leak/en/</a></p><p><a href="https://www.scmp.com/news/china/politics/article/3325596/chinas-internet-watchdog-mandates-1-hour-reporting-serious-cybersecurity-incidents" rel="noopener noreferrer" target="_blank">https://www.scmp.com/news/china/politics/article/3325596/chinas-internet-watchdog-mandates-1-hour-reporting-serious-cybersecurity-incidents</a></p><p><a href="https://thehackernews.com/2025/09/hiddengh0st-winos-and-kkrat-exploit-seo.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/hiddengh0st-winos-and-kkrat-exploit-seo.html</a></p><p><a href="https://thehackernews.com/2025/09/ai-powered-villager-pen-testing-tool.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/ai-powered-villager-pen-testing-tool.html</a></p><p><a href="https://www.securityweek.com/689000-affected-by-insider-breach-at-finwise-bank/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/689000-affected-by-insider-breach-at-finwise-bank/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-confirms-fraudulent-account-created-in-law-enforcement-portal/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-confirms-fraudulent-account-created-in-law-enforcement-portal/</a></p><p><a href="https://therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/uvalde-texas-school-district-temporarily-closing-ransomware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/</a></p><p><a href="https://federalnewsnetwork.com/cybersecurity/2025/09/pentagon-to-roll-out-new-rmf-by-end-of-november/" rel="noopener noreferrer" target="_blank">https://federalnewsnetwork.com/cybersecurity/2025/09/pentagon-to-roll-out-new-rmf-by-end-of-november/</a></p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">63dc7239-fd83-4fbe-9503-723dea096bc3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 16 Sep 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/63dc7239-fd83-4fbe-9503-723dea096bc3.mp3" length="31112756" type="audio/mpeg"/><itunes:duration>21:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>980</itunes:episode><podcast:episode>980</podcast:episode></item><item><title>Samsung Zero-Day Exploited, HybridPetya Bypasses Secure Boot, FBI Warns of Salesforce Theft</title><itunes:title>Samsung Zero-Day Exploited, HybridPetya Bypasses Secure Boot, FBI Warns of Salesforce Theft</itunes:title><description><![CDATA[<p>🎙️ Samsung Zero-Day Exploited, HybridPetya Bypasses Secure Boot, FBI Warns of Salesforce Theft</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 979: Today's episode will discuss the latest news as Samsung Zero-Day Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Vietnam CIC and Panama Finance Ministry Hit by Major Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Pledges Robust Support for Funding Further Development of CVE Program</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Cybersecurity Retention Incentives Under DHS IG Audit Review</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/samsung-patches-zero-day-exploited-against-android-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/samsung-patches-zero-day-exploited-against-android-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/</a></p><p><a href="https://www.securityweek.com/delmia-factory-software-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/delmia-factory-software-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/</a></p><p><a href="https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-pledges-robust-support-for-funding-further-development-of-cve-program/760020/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-pledges-robust-support-for-funding-further-development-of-cve-program/760020/</a></p><p><a href="https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit</a></p><p><a href="https://www.cybersecuritydive.com/news/senior-nsc-official-said-us-needs-to-embrace-offensive-cyber/759779/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/senior-nsc-official-said-us-needs-to-embrace-offensive-cyber/759779/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Samsung Zero-Day Exploited, HybridPetya Bypasses Secure Boot, FBI Warns of Salesforce Theft</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 979: Today's episode will discuss the latest news as Samsung Zero-Day Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Vietnam CIC and Panama Finance Ministry Hit by Major Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Pledges Robust Support for Funding Further Development of CVE Program</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Cybersecurity Retention Incentives Under DHS IG Audit Review</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/samsung-patches-zero-day-exploited-against-android-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/samsung-patches-zero-day-exploited-against-android-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/</a></p><p><a href="https://www.securityweek.com/delmia-factory-software-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/delmia-factory-software-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/</a></p><p><a href="https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-pledges-robust-support-for-funding-further-development-of-cve-program/760020/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-pledges-robust-support-for-funding-further-development-of-cve-program/760020/</a></p><p><a href="https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit</a></p><p><a href="https://www.cybersecuritydive.com/news/senior-nsc-official-said-us-needs-to-embrace-offensive-cyber/759779/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/senior-nsc-official-said-us-needs-to-embrace-offensive-cyber/759779/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4c6b6618-a172-45e0-98e6-36d893bcc98c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 15 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4c6b6618-a172-45e0-98e6-36d893bcc98c.mp3" length="25246772" type="audio/mpeg"/><itunes:duration>17:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>979</itunes:episode><podcast:episode>979</podcast:episode></item><item><title>We Remember 9/11 🇺🇸 &amp; Charlie Kirk 🙏🏼</title><itunes:title>We Remember 9/11 🇺🇸 &amp; Charlie Kirk 🙏🏼</itunes:title><description><![CDATA[<p>🎙️ We Remember 9/11 &amp; Charlie Kirk, NPM Hackers Left Empty-Handed, Jaguar Land Rover Data Breach</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 978: Today's episode will discuss the latest news as We Remember 9/11 &amp; Charlie Kirk with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Investors in Spyware Technology Tripled in 2024</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Passes Defense Policy Bill Including AI and Cyber Provisions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://911memorialmuseum.brightcovegallery.com/" rel="noopener noreferrer" target="_blank">https://911memorialmuseum.brightcovegallery.com/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-left-empty-handed-after-massive-npm-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-left-empty-handed-after-massive-npm-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/jaguar-land-rover-admits-data-breach-caused-by-recent-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/jaguar-land-rover-admits-data-breach-caused-by-recent-cyberattack/</a></p><p><a href="https://therecord.media/us-investors-in-spyware-tripled-in-2024" rel="noopener noreferrer" target="_blank">https://therecord.media/us-investors-in-spyware-tripled-in-2024</a></p><p><a href="https://therecord.media/house-passes-defense-policy-bill-ai-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/house-passes-defense-policy-bill-ai-cyber</a></p><p><a href="https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/</a></p><p><a href="https://therecord.media/vitiuk-bail-anti-corruption-case" rel="noopener noreferrer" target="_blank">https://therecord.media/vitiuk-bail-anti-corruption-case</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ We Remember 9/11 &amp; Charlie Kirk, NPM Hackers Left Empty-Handed, Jaguar Land Rover Data Breach</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 978: Today's episode will discuss the latest news as We Remember 9/11 &amp; Charlie Kirk with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Investors in Spyware Technology Tripled in 2024</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Passes Defense Policy Bill Including AI and Cyber Provisions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://911memorialmuseum.brightcovegallery.com/" rel="noopener noreferrer" target="_blank">https://911memorialmuseum.brightcovegallery.com/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-left-empty-handed-after-massive-npm-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-left-empty-handed-after-massive-npm-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/jaguar-land-rover-admits-data-breach-caused-by-recent-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/jaguar-land-rover-admits-data-breach-caused-by-recent-cyberattack/</a></p><p><a href="https://therecord.media/us-investors-in-spyware-tripled-in-2024" rel="noopener noreferrer" target="_blank">https://therecord.media/us-investors-in-spyware-tripled-in-2024</a></p><p><a href="https://therecord.media/house-passes-defense-policy-bill-ai-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/house-passes-defense-policy-bill-ai-cyber</a></p><p><a href="https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/</a></p><p><a href="https://therecord.media/vitiuk-bail-anti-corruption-case" rel="noopener noreferrer" target="_blank">https://therecord.media/vitiuk-bail-anti-corruption-case</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d7f57e89-436c-4a46-b3a3-a72fbee1dc2b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 11 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d7f57e89-436c-4a46-b3a3-a72fbee1dc2b.mp3" length="20010932" type="audio/mpeg"/><itunes:duration>13:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>978</itunes:episode><podcast:episode>978</podcast:episode></item><item><title>Microsoft September 2025 Patch Tuesday Fixes 81 Flaws, Adobe Patches Critical SessionReaper Flaw in Magento eCommerce Platform, All Patch Tuesday News US Offers $10 Million Reward for Ukrainian Ransomware Operator</title><itunes:title>Microsoft September 2025 Patch Tuesday Fixes 81 Flaws, Adobe Patches Critical SessionReaper Flaw in Magento eCommerce Platform, All Patch Tuesday News US Offers $10 Million Reward for Ukrainian Ransomware Operator</itunes:title><description><![CDATA[<p>🎙️ Microsoft Patch Tuesday 81 Flaws, Adobe SessionReaper Critical, $10M Ransomware Bounty</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 977: Today's episode will discuss the latest news as Microsoft Patch Tuesday 81 Flaws with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet, Ivanti, NVIDIA Release Major Security Updates</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Rockwell Automation Leads with 8 Security Advisories</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Command NSA Dual Hat Single Leader Under Trump Administration</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2025-patch-tuesday-fixes-81-flaws-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2025-patch-tuesday-fixes-81-flaws-two-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessionreaper-flaw-in-magento-ecommerce-platform/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessionreaper-flaw-in-magento-ecommerce-platform/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-maximum-severity-netweaver-command-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-maximum-severity-netweaver-command-execution-flaw/</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-nvidia-release-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-nvidia-release-security-updates/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-rockwell-automation-leads-with-8-security-advisories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-rockwell-automation-leads-with-8-security-advisories/</a></p><p><a href="https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration</a></p><p><a href="https://www.securityweek.com/apple-unveils-iphone-memory-protections-to-combat-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-unveils-iphone-memory-protections-to-combat-sophisticated-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-hide-behind-tor-in-exposed-docker-api-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hide-behind-tor-in-exposed-docker-api-breaches/</a></p><p><a href="https://therecord.media/sean-cairncross-oncd-billington-cybersecurity-speech" rel="noopener noreferrer" target="_blank">https://therecord.media/sean-cairncross-oncd-billington-cybersecurity-speech</a></p><p><a href="https://www.securityweek.com/us-offers-10-million-reward-for-ukrainian-ransomware-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-offers-10-million-reward-for-ukrainian-ransomware-operator/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Microsoft Patch Tuesday 81 Flaws, Adobe SessionReaper Critical, $10M Ransomware Bounty</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 977: Today's episode will discuss the latest news as Microsoft Patch Tuesday 81 Flaws with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet, Ivanti, NVIDIA Release Major Security Updates</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday: Rockwell Automation Leads with 8 Security Advisories</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Command NSA Dual Hat Single Leader Under Trump Administration</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2025-patch-tuesday-fixes-81-flaws-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2025-patch-tuesday-fixes-81-flaws-two-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessionreaper-flaw-in-magento-ecommerce-platform/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessionreaper-flaw-in-magento-ecommerce-platform/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-maximum-severity-netweaver-command-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-maximum-severity-netweaver-command-execution-flaw/</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-nvidia-release-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-nvidia-release-security-updates/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-rockwell-automation-leads-with-8-security-advisories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-rockwell-automation-leads-with-8-security-advisories/</a></p><p><a href="https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration</a></p><p><a href="https://www.securityweek.com/apple-unveils-iphone-memory-protections-to-combat-sophisticated-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-unveils-iphone-memory-protections-to-combat-sophisticated-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-hide-behind-tor-in-exposed-docker-api-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hide-behind-tor-in-exposed-docker-api-breaches/</a></p><p><a href="https://therecord.media/sean-cairncross-oncd-billington-cybersecurity-speech" rel="noopener noreferrer" target="_blank">https://therecord.media/sean-cairncross-oncd-billington-cybersecurity-speech</a></p><p><a href="https://www.securityweek.com/us-offers-10-million-reward-for-ukrainian-ransomware-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-offers-10-million-reward-for-ukrainian-ransomware-operator/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">527ee276-7732-42a4-bebd-8b509804b16b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 10 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/527ee276-7732-42a4-bebd-8b509804b16b.mp3" length="24155252" type="audio/mpeg"/><itunes:duration>16:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>977</itunes:episode><podcast:episode>977</podcast:episode></item><item><title>Hackers Hijack NPM Packages with 2 Billion Weekly Downloads in Attack Guest Neatsun Ziv CEO of Ox Security Joins Show, GitHub Workflows Attack Affects Hundreds of Repos, SalesLoft March Repo Breach</title><itunes:title>Hackers Hijack NPM Packages with 2 Billion Weekly Downloads in Attack Guest Neatsun Ziv CEO of Ox Security Joins Show, GitHub Workflows Attack Affects Hundreds of Repos, SalesLoft March Repo Breach</itunes:title><description><![CDATA[<p>🎙️ NPM 2B Downloads Hijacked with Ox Security CEO Neatsun Ziv, GitHub Workflows Hit</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 976: Today's episode will discuss the latest news as NPM 2B Downloads Hijacked with Ox Security CEO Neatsun Ziv with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SalesLoft March GitHub Repo Breach Led to Salesforce Data Theft Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Jaguar Land Rover Impacts UK Economic Growth Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Calcio Sports Streaming Piracy Service with 123M Yearly Visits Shut Down</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/github-workflows-attack-affects-hundreds-of-repos-thousands-of-secrets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-workflows-attack-affects-hundreds-of-repos-thousands-of-secrets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-calcio-sports-streaming-piracy-service-with-123m-yearly-visits-shut-down/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-calcio-sports-streaming-piracy-service-with-123m-yearly-visits-shut-down/</a></p><p><a href="https://www.securityweek.com/mitsubishi-electric-to-acquire-nozomi-networks-for-nearly-1-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitsubishi-electric-to-acquire-nozomi-networks-for-nearly-1-billion/</a></p><p><a href="https://www.securityweek.com/sentinelone-to-acquire-observo-ai-in-225-million-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sentinelone-to-acquire-observo-ai-in-225-million-deal/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ NPM 2B Downloads Hijacked with Ox Security CEO Neatsun Ziv, GitHub Workflows Hit</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 976: Today's episode will discuss the latest news as NPM 2B Downloads Hijacked with Ox Security CEO Neatsun Ziv with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SalesLoft March GitHub Repo Breach Led to Salesforce Data Theft Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Jaguar Land Rover Impacts UK Economic Growth Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Calcio Sports Streaming Piracy Service with 123M Yearly Visits Shut Down</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/github-workflows-attack-affects-hundreds-of-repos-thousands-of-secrets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-workflows-attack-affects-hundreds-of-repos-thousands-of-secrets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-calcio-sports-streaming-piracy-service-with-123m-yearly-visits-shut-down/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-calcio-sports-streaming-piracy-service-with-123m-yearly-visits-shut-down/</a></p><p><a href="https://www.securityweek.com/mitsubishi-electric-to-acquire-nozomi-networks-for-nearly-1-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitsubishi-electric-to-acquire-nozomi-networks-for-nearly-1-billion/</a></p><p><a href="https://www.securityweek.com/sentinelone-to-acquire-observo-ai-in-225-million-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sentinelone-to-acquire-observo-ai-in-225-million-deal/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">54d129ac-9ab3-4147-a547-5ab34fb776c1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 09 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/54d129ac-9ab3-4147-a547-5ab34fb776c1.mp3" length="27078452" type="audio/mpeg"/><itunes:duration>18:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>976</itunes:episode><podcast:episode>976</podcast:episode></item><item><title>China Trade Talks Spy Concerns, Wealthsimple Supply Chain Hit, EU Fines Google $3.5B</title><itunes:title>China Trade Talks Spy Concerns, Wealthsimple Supply Chain Hit, EU Fines Google $3.5B</itunes:title><description><![CDATA[<p>🎙️ China Trade Talks Spy Concerns, Wealthsimple Supply Chain Hit, EU Fines Google $3.5B</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 975: Today's episode will discuss the latest news as China Trade Talks Spy Concerns with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qantas Airline Reduces Executive Bonuses Following Major Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VirusTotal Finds Hidden Malware Phishing Campaign in SVG Files</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 6,700 Private Repositories Made Public in NX Supply Chain Attack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/china-trade-talks-spy-5c4801ca?mod=politics_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/china-trade-talks-spy-5c4801ca?mod=politics_lead_pos1</a></p><p><a href="https://www.securityweek.com/fintech-firm-wealthsimple-says-supply-chain-attack-resulted-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fintech-firm-wealthsimple-says-supply-chain-attack-resulted-in-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/</a></p><p><a href="https://therecord.media/qantas-airline-reduces-bonuses-executives-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/qantas-airline-reduces-bonuses-executives-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/</a></p><p><a href="https://www.securityweek.com/over-6700-private-repositories-made-public-in-nx-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-6700-private-repositories-made-public-in-nx-supply-chain-attack/</a></p><p><a href="https://thecyberexpress.com/critical-argo-cd-api-flaw-cve-2025-55190/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/critical-argo-cd-api-flaw-cve-2025-55190/</a></p><p><a href="https://therecord.media/powerschool-data-breach-texas-lawsuit-ken-paxton" rel="noopener noreferrer" target="_blank">https://therecord.media/powerschool-data-breach-texas-lawsuit-ken-paxton</a></p><p><a href="https://www.bleepingcomputer.com/news/google/eu-fines-google-35-billion-for-anti-competitive-ad-practices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/google/eu-fines-google-35-billion-for-anti-competitive-ad-practices/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China Trade Talks Spy Concerns, Wealthsimple Supply Chain Hit, EU Fines Google $3.5B</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 975: Today's episode will discuss the latest news as China Trade Talks Spy Concerns with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qantas Airline Reduces Executive Bonuses Following Major Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VirusTotal Finds Hidden Malware Phishing Campaign in SVG Files</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 6,700 Private Repositories Made Public in NX Supply Chain Attack</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/china-trade-talks-spy-5c4801ca?mod=politics_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/china-trade-talks-spy-5c4801ca?mod=politics_lead_pos1</a></p><p><a href="https://www.securityweek.com/fintech-firm-wealthsimple-says-supply-chain-attack-resulted-in-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fintech-firm-wealthsimple-says-supply-chain-attack-resulted-in-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/</a></p><p><a href="https://therecord.media/qantas-airline-reduces-bonuses-executives-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/qantas-airline-reduces-bonuses-executives-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/</a></p><p><a href="https://www.securityweek.com/over-6700-private-repositories-made-public-in-nx-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-6700-private-repositories-made-public-in-nx-supply-chain-attack/</a></p><p><a href="https://thecyberexpress.com/critical-argo-cd-api-flaw-cve-2025-55190/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/critical-argo-cd-api-flaw-cve-2025-55190/</a></p><p><a href="https://therecord.media/powerschool-data-breach-texas-lawsuit-ken-paxton" rel="noopener noreferrer" target="_blank">https://therecord.media/powerschool-data-breach-texas-lawsuit-ken-paxton</a></p><p><a href="https://www.bleepingcomputer.com/news/google/eu-fines-google-35-billion-for-anti-competitive-ad-practices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/google/eu-fines-google-35-billion-for-anti-competitive-ad-practices/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4c8a49ad-de9c-4823-a8b8-4ce9faa3fc06</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 08 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4c8a49ad-de9c-4823-a8b8-4ce9faa3fc06.mp3" length="28038068" type="audio/mpeg"/><itunes:duration>19:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>975</itunes:episode><podcast:episode>975</podcast:episode></item><item><title>Google Fined $381M Over Gmail Ads, US Sues Toy Maker Over Kids&apos; China Data, Sitecore Zero-Day</title><itunes:title>Google Fined $381M Over Gmail Ads, US Sues Toy Maker Over Kids&apos; China Data, Sitecore Zero-Day</itunes:title><description><![CDATA[<p>🎙️ Google Fined $381M Over Gmail Ads, US Sues Toy Maker Over Kids' China Data, Sitecore Zero-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 974: Today's episode will discuss the latest news as Google Fined $381M Over Gmail Ads with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Homeland Committee Advances Cyber Information Sharing Law</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Two Exploited Vulnerabilities Patched in Android Security Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit Sitecore Zero-Day for Malware Delivery in Active Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thecyberexpress.com/google-fined-381-million-over-gmail-ads-cnil/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-fined-381-million-over-gmail-ads-cnil/</a></p><p><a href="https://therecord.media/european-court-rejects-challenge-us-eu-data-transfer-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/european-court-rejects-challenge-us-eu-data-transfer-agreement</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-sues-robot-toy-maker-for-exposing-childrens-data-to-chinese-devs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-sues-robot-toy-maker-for-exposing-childrens-data-to-chinese-devs/</a></p><p><a href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china" rel="noopener noreferrer" target="_blank">https://therecord.media/czech-nukib-warns-against-products-sending-data-china</a></p><p><a href="https://therecord.media/house-homeland-committee-cyber-information-sharing-law" rel="noopener noreferrer" target="_blank">https://therecord.media/house-homeland-committee-cyber-information-sharing-law</a></p><p><a href="https://www.securityweek.com/two-exploited-vulnerabilities-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-exploited-vulnerabilities-patched-in-android/</a></p><p><a href="https://www.securityweek.com/hackers-exploit-sitecore-zero-day-for-malware-delivery/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-exploit-sitecore-zero-day-for-malware-delivery/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/</a></p><p><a href="https://www.securityweek.com/us-cybersecurity-agency-flags-wi-fi-range-extender-vulnerability-under-active-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-cybersecurity-agency-flags-wi-fi-range-extender-vulnerability-under-active-attack/</a></p><p><a href="https://therecord.media/streameast-sports-piracy-site-takedown-arrests-egypt" rel="noopener noreferrer" target="_blank">https://therecord.media/streameast-sports-piracy-site-takedown-arrests-egypt</a></p><p><a href="https://www.securityweek.com/cato-networks-acquires-ai-security-firm-aim-security/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cato-networks-acquires-ai-security-firm-aim-security/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Google Fined $381M Over Gmail Ads, US Sues Toy Maker Over Kids' China Data, Sitecore Zero-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 974: Today's episode will discuss the latest news as Google Fined $381M Over Gmail Ads with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;House Homeland Committee Advances Cyber Information Sharing Law</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Two Exploited Vulnerabilities Patched in Android Security Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit Sitecore Zero-Day for Malware Delivery in Active Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thecyberexpress.com/google-fined-381-million-over-gmail-ads-cnil/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-fined-381-million-over-gmail-ads-cnil/</a></p><p><a href="https://therecord.media/european-court-rejects-challenge-us-eu-data-transfer-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/european-court-rejects-challenge-us-eu-data-transfer-agreement</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-sues-robot-toy-maker-for-exposing-childrens-data-to-chinese-devs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-sues-robot-toy-maker-for-exposing-childrens-data-to-chinese-devs/</a></p><p><a href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china" rel="noopener noreferrer" target="_blank">https://therecord.media/czech-nukib-warns-against-products-sending-data-china</a></p><p><a href="https://therecord.media/house-homeland-committee-cyber-information-sharing-law" rel="noopener noreferrer" target="_blank">https://therecord.media/house-homeland-committee-cyber-information-sharing-law</a></p><p><a href="https://www.securityweek.com/two-exploited-vulnerabilities-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-exploited-vulnerabilities-patched-in-android/</a></p><p><a href="https://www.securityweek.com/hackers-exploit-sitecore-zero-day-for-malware-delivery/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-exploit-sitecore-zero-day-for-malware-delivery/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/</a></p><p><a href="https://www.securityweek.com/us-cybersecurity-agency-flags-wi-fi-range-extender-vulnerability-under-active-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-cybersecurity-agency-flags-wi-fi-range-extender-vulnerability-under-active-attack/</a></p><p><a href="https://therecord.media/streameast-sports-piracy-site-takedown-arrests-egypt" rel="noopener noreferrer" target="_blank">https://therecord.media/streameast-sports-piracy-site-takedown-arrests-egypt</a></p><p><a href="https://www.securityweek.com/cato-networks-acquires-ai-security-firm-aim-security/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cato-networks-acquires-ai-security-firm-aim-security/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">10a6dc3c-a8dc-4d6a-8d8a-6457f214a601</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 04 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/10a6dc3c-a8dc-4d6a-8d8a-6457f214a601.mp3" length="28138292" type="audio/mpeg"/><itunes:duration>19:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>974</itunes:episode><podcast:episode>974</podcast:episode></item><item><title>Cloudflare Hit in Supply Chain Attack, Jaguar Land Rover Cyberattack, $130M Bank Heist Attempt</title><itunes:title>Cloudflare Hit in Supply Chain Attack, Jaguar Land Rover Cyberattack, $130M Bank Heist Attempt</itunes:title><description><![CDATA[<p>🎙️ Cloudflare Hit in Supply Chain Attack, Jaguar Land Rover Cyberattack, $130M Bank Heist Attempt</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 973: Today's episode will discuss the latest news as Cloudflare Hit in Supply Chain Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Disney Pays $10 Million to FTC in Major Settlement Agreement</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Blocks Record 11.5 Tbps DDoS Attack in Massive Defense</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-hit-by-data-breach-in-salesloft-drift-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflare-hit-by-data-breach-in-salesloft-drift-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/pennsylvania-attorney-general-confirms-ransomware-behind-weeks-long-outage/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pennsylvania-attorney-general-confirms-ransomware-behind-weeks-long-outage/</a></p><p><a href="https://www.securityweek.com/jaguar-land-rover-operations-severely-disrupted-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/jaguar-land-rover-operations-severely-disrupted-by-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-fintech-firm-in-attempted-130m-bank-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-fintech-firm-in-attempted-130m-bank-heist/</a></p><p><a href="https://thecyberexpress.com/disney-pays-10m-to-ftc/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/disney-pays-10m-to-ftc/</a></p><p><a href="https://www.securityweek.com/cloudflare-blocks-record-11-5-tbps-ddos-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-blocks-record-11-5-tbps-ddos-attack/</a></p><p><a href="https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/</a></p><p><a href="https://therecord.media/andersen-leadership-cisa-role" rel="noopener noreferrer" target="_blank">https://therecord.media/andersen-leadership-cisa-role</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cloudflare Hit in Supply Chain Attack, Jaguar Land Rover Cyberattack, $130M Bank Heist Attempt</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 973: Today's episode will discuss the latest news as Cloudflare Hit in Supply Chain Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Disney Pays $10 Million to FTC in Major Settlement Agreement</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cloudflare Blocks Record 11.5 Tbps DDoS Attack in Massive Defense</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-hit-by-data-breach-in-salesloft-drift-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflare-hit-by-data-breach-in-salesloft-drift-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/pennsylvania-attorney-general-confirms-ransomware-behind-weeks-long-outage/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pennsylvania-attorney-general-confirms-ransomware-behind-weeks-long-outage/</a></p><p><a href="https://www.securityweek.com/jaguar-land-rover-operations-severely-disrupted-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/jaguar-land-rover-operations-severely-disrupted-by-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-fintech-firm-in-attempted-130m-bank-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-fintech-firm-in-attempted-130m-bank-heist/</a></p><p><a href="https://thecyberexpress.com/disney-pays-10m-to-ftc/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/disney-pays-10m-to-ftc/</a></p><p><a href="https://www.securityweek.com/cloudflare-blocks-record-11-5-tbps-ddos-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-blocks-record-11-5-tbps-ddos-attack/</a></p><p><a href="https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/</a></p><p><a href="https://therecord.media/andersen-leadership-cisa-role" rel="noopener noreferrer" target="_blank">https://therecord.media/andersen-leadership-cisa-role</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2f65e5d4-ecf8-429e-b3b4-21827aceed25</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 03 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2f65e5d4-ecf8-429e-b3b4-21827aceed25.mp3" length="26393588" type="audio/mpeg"/><itunes:duration>18:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>973</itunes:episode><podcast:episode>973</podcast:episode></item><item><title>Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple</title><itunes:title>Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple</itunes:title><description><![CDATA[<p>🎙️ Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 972: Today's episode will discuss the latest news as Palo Alto Networks Breached with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukrainian Network FDN3 Launches Massive Cyberattack Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Decoding CVE-2025-0165 Flaw: Critical Vulnerability Analysis</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TamperedChef InfoStealer Delivered Through Fraudulent PDF Editor</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-data-breach-exposes-customer-info-support-tickets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-data-breach-exposes-customer-info-support-tickets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/</a></p><p><a href="https://www.securityweek.com/whatsapp-zero-day-exploited-in-attacks-targeting-apple-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/whatsapp-zero-day-exploited-in-attacks-targeting-apple-users/</a></p><p><a href="https://thehackernews.com/2025/09/ukrainian-network-fdn3-launches-massive.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/ukrainian-network-fdn3-launches-massive.html</a></p><p><a href="https://thecyberexpress.com/decoding-cve-2025-0165-flaw/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/decoding-cve-2025-0165-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/</a></p><p><a href="https://thehackernews.com/2025/09/malicious-npm-package-nodejs-smtp.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/malicious-npm-package-nodejs-smtp.html</a></p><p><a href="https://therecord.media/spain-cancels-10-million-euro-huawei-contract" rel="noopener noreferrer" target="_blank">https://therecord.media/spain-cancels-10-million-euro-huawei-contract</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 972: Today's episode will discuss the latest news as Palo Alto Networks Breached with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukrainian Network FDN3 Launches Massive Cyberattack Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Decoding CVE-2025-0165 Flaw: Critical Vulnerability Analysis</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TamperedChef InfoStealer Delivered Through Fraudulent PDF Editor</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-data-breach-exposes-customer-info-support-tickets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-data-breach-exposes-customer-info-support-tickets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/</a></p><p><a href="https://www.securityweek.com/whatsapp-zero-day-exploited-in-attacks-targeting-apple-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/whatsapp-zero-day-exploited-in-attacks-targeting-apple-users/</a></p><p><a href="https://thehackernews.com/2025/09/ukrainian-network-fdn3-launches-massive.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/ukrainian-network-fdn3-launches-massive.html</a></p><p><a href="https://thecyberexpress.com/decoding-cve-2025-0165-flaw/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/decoding-cve-2025-0165-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/</a></p><p><a href="https://thehackernews.com/2025/09/malicious-npm-package-nodejs-smtp.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/09/malicious-npm-package-nodejs-smtp.html</a></p><p><a href="https://therecord.media/spain-cancels-10-million-euro-huawei-contract" rel="noopener noreferrer" target="_blank">https://therecord.media/spain-cancels-10-million-euro-huawei-contract</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ba870af5-dc20-4759-ae24-39da6b911d3a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 02 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ba870af5-dc20-4759-ae24-39da6b911d3a.mp3" length="25687988" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>972</itunes:episode><podcast:episode>972</podcast:episode></item><item><title>Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware</title><itunes:title>Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware</itunes:title><description><![CDATA[<p>🎙️ Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 971: Today's episode will discuss the latest news as Google Workspace Hit in Salesforce Wave with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Noem Fires FEMA IT Team Over DHS Cybersecurity Compliance Issues</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WhatsApp Patches Vulnerability Exploited in Active Zero-Day Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Amazon Disrupts APT29 Watering Hole Attack Infrastructure</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/</a></p><p><a href="https://www.securityweek.com/transunion-data-breach-impacts-4-4-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/transunion-data-breach-impacts-4-4-million/</a></p><p><a href="https://www.securityweek.com/nevada-confirms-ransomware-attack-behind-statewide-service-disruptions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nevada-confirms-ransomware-attack-behind-statewide-service-disruptions/</a></p><p><a href="https://therecord.media/scammer-steals-baltimore-city-impersonation-vendor" rel="noopener noreferrer" target="_blank">https://therecord.media/scammer-steals-baltimore-city-impersonation-vendor</a></p><p><a href="https://thecyberexpress.com/noem-fires-fema-it-team-over-dhs-cybersecurity/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/noem-fires-fema-it-team-over-dhs-cybersecurity/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-patches-vulnerability-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-patches-vulnerability-exploited-in-zero-day-attacks/</a></p><p><a href="https://thehackernews.com/2025/08/amazon-disrupts-apt29-watering-hole.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/amazon-disrupts-apt29-watering-hole.html</a></p><p><a href="https://thecyberexpress.com/dutch-isps-targeted-in-salt-typhoon-campaign/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/dutch-isps-targeted-in-salt-typhoon-campaign/</a></p><p><a href="https://www.bankinfosecurity.com/pentagon-probes-microsofts-use-chinese-coders-a-29335" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/pentagon-probes-microsofts-use-chinese-coders-a-29335</a></p><p><a href="https://thecyberexpress.com/rosneft-cyberattack-german-hacker-faces-trial/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/rosneft-cyberattack-german-hacker-faces-trial/</a></p><p><a href="https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 971: Today's episode will discuss the latest news as Google Workspace Hit in Salesforce Wave with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Noem Fires FEMA IT Team Over DHS Cybersecurity Compliance Issues</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WhatsApp Patches Vulnerability Exploited in Active Zero-Day Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Amazon Disrupts APT29 Watering Hole Attack Infrastructure</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/</a></p><p><a href="https://www.securityweek.com/transunion-data-breach-impacts-4-4-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/transunion-data-breach-impacts-4-4-million/</a></p><p><a href="https://www.securityweek.com/nevada-confirms-ransomware-attack-behind-statewide-service-disruptions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nevada-confirms-ransomware-attack-behind-statewide-service-disruptions/</a></p><p><a href="https://therecord.media/scammer-steals-baltimore-city-impersonation-vendor" rel="noopener noreferrer" target="_blank">https://therecord.media/scammer-steals-baltimore-city-impersonation-vendor</a></p><p><a href="https://thecyberexpress.com/noem-fires-fema-it-team-over-dhs-cybersecurity/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/noem-fires-fema-it-team-over-dhs-cybersecurity/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-patches-vulnerability-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-patches-vulnerability-exploited-in-zero-day-attacks/</a></p><p><a href="https://thehackernews.com/2025/08/amazon-disrupts-apt29-watering-hole.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/amazon-disrupts-apt29-watering-hole.html</a></p><p><a href="https://thecyberexpress.com/dutch-isps-targeted-in-salt-typhoon-campaign/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/dutch-isps-targeted-in-salt-typhoon-campaign/</a></p><p><a href="https://www.bankinfosecurity.com/pentagon-probes-microsofts-use-chinese-coders-a-29335" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/pentagon-probes-microsofts-use-chinese-coders-a-29335</a></p><p><a href="https://thecyberexpress.com/rosneft-cyberattack-german-hacker-faces-trial/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/rosneft-cyberattack-german-hacker-faces-trial/</a></p><p><a href="https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e781526c-13ce-41a8-9b58-c03e11af6607</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 01 Sep 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e781526c-13ce-41a8-9b58-c03e11af6607.mp3" length="26700596" type="audio/mpeg"/><itunes:duration>18:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>971</itunes:episode><podcast:episode>971</podcast:episode></item><item><title>First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit</title><itunes:title>First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit</itunes:title><description><![CDATA[<p>🎙️ First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 970: Today's episode will discuss the latest news as First AI-Weaponized Supply Chain Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ShadowSilk Hits 36 Government Targets in Sophisticated Espionage Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Allied Spy Agencies Blame Chinese Companies for Salt Typhoon Attack Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Storm-0501 Hackers Shift to Ransomware Attacks in the Cloud Environment</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hackers-target-popular-nx-build-system-in-first-ai-weaponized-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-popular-nx-build-system-in-first-ai-weaponized-supply-chain-attack/</a></p><p><a href="https://thecyberexpress.com/hacker-used-claude-ai-to-automate-attack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hacker-used-claude-ai-to-automate-attack/</a></p><p><a href="https://www.securityweek.com/hackers-weaponize-trust-with-ai-crafted-emails-to-deploy-screenconnect/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-weaponize-trust-with-ai-crafted-emails-to-deploy-screenconnect/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/</a></p><p><a href="https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html</a></p><p><a href="https://therecord.media/allied-spy-agencies-blame-chinese-companies-salt-typhoon" rel="noopener noreferrer" target="_blank">https://therecord.media/allied-spy-agencies-blame-chinese-companies-salt-typhoon</a></p><p><a href="https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/freepbx-servers-hacked-via-zero-day-emergency-fix-released/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/freepbx-servers-hacked-via-zero-day-emergency-fix-released/</a></p><p><a href="https://therecord.media/us-sanctions-company-national-north" rel="noopener noreferrer" target="_blank">https://therecord.media/us-sanctions-company-national-north</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-onum-to-fuel-falcon-next-gen-siem-with-real-time-telemetry/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-onum-to-fuel-falcon-next-gen-siem-with-real-time-telemetry/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 970: Today's episode will discuss the latest news as First AI-Weaponized Supply Chain Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ShadowSilk Hits 36 Government Targets in Sophisticated Espionage Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Allied Spy Agencies Blame Chinese Companies for Salt Typhoon Attack Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Storm-0501 Hackers Shift to Ransomware Attacks in the Cloud Environment</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hackers-target-popular-nx-build-system-in-first-ai-weaponized-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-target-popular-nx-build-system-in-first-ai-weaponized-supply-chain-attack/</a></p><p><a href="https://thecyberexpress.com/hacker-used-claude-ai-to-automate-attack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hacker-used-claude-ai-to-automate-attack/</a></p><p><a href="https://www.securityweek.com/hackers-weaponize-trust-with-ai-crafted-emails-to-deploy-screenconnect/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-weaponize-trust-with-ai-crafted-emails-to-deploy-screenconnect/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/</a></p><p><a href="https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html</a></p><p><a href="https://therecord.media/allied-spy-agencies-blame-chinese-companies-salt-typhoon" rel="noopener noreferrer" target="_blank">https://therecord.media/allied-spy-agencies-blame-chinese-companies-salt-typhoon</a></p><p><a href="https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/freepbx-servers-hacked-via-zero-day-emergency-fix-released/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/freepbx-servers-hacked-via-zero-day-emergency-fix-released/</a></p><p><a href="https://therecord.media/us-sanctions-company-national-north" rel="noopener noreferrer" target="_blank">https://therecord.media/us-sanctions-company-national-north</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-onum-to-fuel-falcon-next-gen-siem-with-real-time-telemetry/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-onum-to-fuel-falcon-next-gen-siem-with-real-time-telemetry/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6621bc9b-4e6a-449b-90c2-400e1eefb163</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 28 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6621bc9b-4e6a-449b-90c2-400e1eefb163.mp3" length="31979701" type="audio/mpeg"/><itunes:duration>22:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>970</itunes:episode><podcast:episode>970</podcast:episode></item><item><title>First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked</title><itunes:title>First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked</itunes:title><description><![CDATA[<p>🎙️ First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 969: Today's episode will discuss the latest news as First AI-Powered Ransomware Found with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Japan, US, South Korea Forum Addresses North Korea IT Worker Scheme</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google to Verify All Android Developers to Block Malware on Google Play</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MixShell Malware Delivered via Contact Form Submissions in New Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/</a></p><p><a href="https://thedigitalship.com/news/maritime-satellite-communications/hackers-disrupted-irans-tanker-fleet/" rel="noopener noreferrer" target="_blank">https://thedigitalship.com/news/maritime-satellite-communications/hackers-disrupted-irans-tanker-fleet/</a></p><p><a href="https://www.cyberdaily.au/security/12556-opportunistic-iranian-cyber-attacks-targeting-australia-possible-google-warns" rel="noopener noreferrer" target="_blank">https://www.cyberdaily.au/security/12556-opportunistic-iranian-cyber-attacks-targeting-australia-possible-google-warns</a></p><p><a href="https://therecord.media/japan-us-south-korea-forum-north-korea-it-worker-scheme" rel="noopener noreferrer" target="_blank">https://therecord.media/japan-us-south-korea-forum-north-korea-it-worker-scheme</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-block-malware-on-google-play/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-block-malware-on-google-play/</a></p><p><a href="https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html</a></p><p><a href="https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/</a></p><p><a href="https://www.securityweek.com/docker-desktop-vulnerability-leads-to-host-compromise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/docker-desktop-vulnerability-leads-to-host-compromise/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 969: Today's episode will discuss the latest news as First AI-Powered Ransomware Found with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Japan, US, South Korea Forum Addresses North Korea IT Worker Scheme</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google to Verify All Android Developers to Block Malware on Google Play</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MixShell Malware Delivered via Contact Form Submissions in New Campaign</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/</a></p><p><a href="https://thedigitalship.com/news/maritime-satellite-communications/hackers-disrupted-irans-tanker-fleet/" rel="noopener noreferrer" target="_blank">https://thedigitalship.com/news/maritime-satellite-communications/hackers-disrupted-irans-tanker-fleet/</a></p><p><a href="https://www.cyberdaily.au/security/12556-opportunistic-iranian-cyber-attacks-targeting-australia-possible-google-warns" rel="noopener noreferrer" target="_blank">https://www.cyberdaily.au/security/12556-opportunistic-iranian-cyber-attacks-targeting-australia-possible-google-warns</a></p><p><a href="https://therecord.media/japan-us-south-korea-forum-north-korea-it-worker-scheme" rel="noopener noreferrer" target="_blank">https://therecord.media/japan-us-south-korea-forum-north-korea-it-worker-scheme</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-block-malware-on-google-play/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-to-verify-all-android-devs-to-block-malware-on-google-play/</a></p><p><a href="https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html</a></p><p><a href="https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/citrix-patches-exploited-netscaler-zero-day/</a></p><p><a href="https://www.securityweek.com/docker-desktop-vulnerability-leads-to-host-compromise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/docker-desktop-vulnerability-leads-to-host-compromise/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2532b5d8-6dd4-4402-b26f-4b7b971fb70a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 27 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2532b5d8-6dd4-4402-b26f-4b7b971fb70a.mp3" length="25998705" type="audio/mpeg"/><itunes:duration>18:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>969</itunes:episode><podcast:episode>969</podcast:episode></item><item><title>Auchan Retailer Data Breach, Nevada State Offices Halt Services After Major Cyber Incident, South Korea Arrests Hacker Accused of Targeting BTS, Maryland Cyberattack Disrupts Transit Services</title><itunes:title>Auchan Retailer Data Breach, Nevada State Offices Halt Services After Major Cyber Incident, South Korea Arrests Hacker Accused of Targeting BTS, Maryland Cyberattack Disrupts Transit Services</itunes:title><description><![CDATA[<p>🎙️ Auchan Retailer Breach Hits 100K+, Nevada State Offices Down, BTS Hacker Arrested</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 968: Today's episode will discuss the latest news as Auchan Retailer Breach Hits 100K+ with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Organizations Warned of Exploited Git Vulnerability Being Used in Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pakistani Hackers Back at Targeting Indian Government Entities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Adds Three Exploited Vulnerabilities to Known Exploited Vulnerabilities Catalog</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/</a></p><p><a href="https://therecord.media/maryland-cyberattack-transit-disabled-people" rel="noopener noreferrer" target="_blank">https://therecord.media/maryland-cyberattack-transit-disabled-people</a></p><p><a href="https://www.bankinfosecurity.com/nevada-state-offices-halts-services-after-cyber-incident-a-29290" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/nevada-state-offices-halts-services-after-cyber-incident-a-29290</a></p><p><a href="https://thecyberexpress.com/china-espionage-campaign-targets-diplomats/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/china-espionage-campaign-targets-diplomats/</a></p><p><a href="https://therecord.media/south-korea-arrests-hacker-accused-of-targeting-celebrities-bts" rel="noopener noreferrer" target="_blank">https://therecord.media/south-korea-arrests-hacker-accused-of-targeting-celebrities-bts</a></p><p><a href="https://www.securityweek.com/organizations-warned-of-exploited-git-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-warned-of-exploited-git-vulnerability/</a></p><p><a href="https://www.securityweek.com/pakistani-hackers-back-at-targeting-indian-government-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pakistani-hackers-back-at-targeting-indian-government-entities/</a></p><p><a href="https://thehackernews.com/2025/08/cisa-adds-three-exploited.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/cisa-adds-three-exploited.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/</a></p><p><a href="https://therecord.media/wyden-probe-federal-judiciary-data-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-probe-federal-judiciary-data-breaches</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Auchan Retailer Breach Hits 100K+, Nevada State Offices Down, BTS Hacker Arrested</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 968: Today's episode will discuss the latest news as Auchan Retailer Breach Hits 100K+ with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Organizations Warned of Exploited Git Vulnerability Being Used in Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pakistani Hackers Back at Targeting Indian Government Entities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Adds Three Exploited Vulnerabilities to Known Exploited Vulnerabilities Catalog</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/</a></p><p><a href="https://therecord.media/maryland-cyberattack-transit-disabled-people" rel="noopener noreferrer" target="_blank">https://therecord.media/maryland-cyberattack-transit-disabled-people</a></p><p><a href="https://www.bankinfosecurity.com/nevada-state-offices-halts-services-after-cyber-incident-a-29290" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/nevada-state-offices-halts-services-after-cyber-incident-a-29290</a></p><p><a href="https://thecyberexpress.com/china-espionage-campaign-targets-diplomats/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/china-espionage-campaign-targets-diplomats/</a></p><p><a href="https://therecord.media/south-korea-arrests-hacker-accused-of-targeting-celebrities-bts" rel="noopener noreferrer" target="_blank">https://therecord.media/south-korea-arrests-hacker-accused-of-targeting-celebrities-bts</a></p><p><a href="https://www.securityweek.com/organizations-warned-of-exploited-git-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-warned-of-exploited-git-vulnerability/</a></p><p><a href="https://www.securityweek.com/pakistani-hackers-back-at-targeting-indian-government-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pakistani-hackers-back-at-targeting-indian-government-entities/</a></p><p><a href="https://thehackernews.com/2025/08/cisa-adds-three-exploited.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/cisa-adds-three-exploited.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/</a></p><p><a href="https://therecord.media/wyden-probe-federal-judiciary-data-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-probe-federal-judiciary-data-breaches</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a913f632-d804-4476-af05-57ec1d310d0d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 26 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a913f632-d804-4476-af05-57ec1d310d0d.mp3" length="28869458" type="audio/mpeg"/><itunes:duration>20:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>968</itunes:episode><podcast:episode>968</podcast:episode></item><item><title>Farmers Insurance Data Breach, Large Interpol Cybercrime Crackdown in Africa Leads to Arrest of Over 1,200 Suspects, Colt Confirms Customer Data Stolen, DataIO Hit by Ransomware Attack</title><itunes:title>Farmers Insurance Data Breach, Large Interpol Cybercrime Crackdown in Africa Leads to Arrest of Over 1,200 Suspects, Colt Confirms Customer Data Stolen, DataIO Hit by Ransomware Attack</itunes:title><description><![CDATA[<p>🎙️ Farmers Insurance 1M+ Breach, Interpol Arrests 1,200+, Colt Data Auctioned, Censorship Battle</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 967: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tech Companies Face FTC Scrutiny Over Censorship Laws Compliance</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Murky Panda Hackers Exploit Cloud Trust to Hack Downstream Customers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Seeks Input on SBOM Update to Tackle Real-World Security Gaps</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/farmers-insurance-data-breach-impacts-over-1-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/farmers-insurance-data-breach-impacts-over-1-million-people/</a></p><p><a href="https://therecord.media/electronics-manufacturer-dataio-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/electronics-manufacturer-dataio-ransomware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/colt-confirms-customer-data-stolen-as-warlock-ransomware-auctions-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/colt-confirms-customer-data-stolen-as-warlock-ransomware-auctions-files/</a></p><p><a href="https://therecord.media/tech-companies-ftc-censorship-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/tech-companies-ftc-censorship-laws</a></p><p><a href="https://www.bleepingcomputer.com/news/security/murky-panda-hackers-exploit-cloud-trust-to-hack-downstream-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/murky-panda-hackers-exploit-cloud-trust-to-hack-downstream-customers/</a></p><p><a href="https://www.bankinfosecurity.com/cisa-seeks-input-on-sbom-update-to-tackle-real-world-gaps-a-29280" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cisa-seeks-input-on-sbom-update-to-tackle-real-world-gaps-a-29280</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/</a></p><p><a href="https://www.securityweek.com/sase-company-netskope-files-for-ipo/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sase-company-netskope-files-for-ipo/</a></p><p><a href="https://www.securityweek.com/large-interpol-cybercrime-crackdown-in-africa-leads-to-the-arrest-of-over-1200-suspects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/large-interpol-cybercrime-crackdown-in-africa-leads-to-the-arrest-of-over-1200-suspects/</a></p><p><a href="https://therecord.media/chinese-national-sentenced-prison" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-national-sentenced-prison</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Farmers Insurance 1M+ Breach, Interpol Arrests 1,200+, Colt Data Auctioned, Censorship Battle</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 967: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Tech Companies Face FTC Scrutiny Over Censorship Laws Compliance</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Murky Panda Hackers Exploit Cloud Trust to Hack Downstream Customers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Seeks Input on SBOM Update to Tackle Real-World Security Gaps</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/farmers-insurance-data-breach-impacts-over-1-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/farmers-insurance-data-breach-impacts-over-1-million-people/</a></p><p><a href="https://therecord.media/electronics-manufacturer-dataio-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/electronics-manufacturer-dataio-ransomware</a></p><p><a href="https://www.bleepingcomputer.com/news/security/colt-confirms-customer-data-stolen-as-warlock-ransomware-auctions-files/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/colt-confirms-customer-data-stolen-as-warlock-ransomware-auctions-files/</a></p><p><a href="https://therecord.media/tech-companies-ftc-censorship-laws" rel="noopener noreferrer" target="_blank">https://therecord.media/tech-companies-ftc-censorship-laws</a></p><p><a href="https://www.bleepingcomputer.com/news/security/murky-panda-hackers-exploit-cloud-trust-to-hack-downstream-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/murky-panda-hackers-exploit-cloud-trust-to-hack-downstream-customers/</a></p><p><a href="https://www.bankinfosecurity.com/cisa-seeks-input-on-sbom-update-to-tackle-real-world-gaps-a-29280" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/cisa-seeks-input-on-sbom-update-to-tackle-real-world-gaps-a-29280</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/</a></p><p><a href="https://www.securityweek.com/sase-company-netskope-files-for-ipo/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sase-company-netskope-files-for-ipo/</a></p><p><a href="https://www.securityweek.com/large-interpol-cybercrime-crackdown-in-africa-leads-to-the-arrest-of-over-1200-suspects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/large-interpol-cybercrime-crackdown-in-africa-leads-to-the-arrest-of-over-1200-suspects/</a></p><p><a href="https://therecord.media/chinese-national-sentenced-prison" rel="noopener noreferrer" target="_blank">https://therecord.media/chinese-national-sentenced-prison</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">97b5fef1-dddd-4efc-8dc8-369be86e5c32</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 25 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/97b5fef1-dddd-4efc-8dc8-369be86e5c32.mp3" length="27764165" type="audio/mpeg"/><itunes:duration>19:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>967</itunes:episode><podcast:episode>967</podcast:episode></item><item><title>Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for Diplomat Attacks</title><itunes:title>Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for Diplomat Attacks</itunes:title><description><![CDATA[<p>🎙️ Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for IT Worker Scams</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 966: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Hackers Accused in Wave of Water Sector Cyberattacks Across US</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Cisco FSB Static Tundra Operation Targets Critical Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Cyberattack Hits Investment Platform in Ukraine Financial Sector</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/belgian-telecom-says-cyberattack-compromised-data-on-850000" rel="noopener noreferrer" target="_blank">https://therecord.media/belgian-telecom-says-cyberattack-compromised-data-on-850000</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-new-actively-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-new-actively-exploited-zero-day/</a></p><p><a href="https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html</a></p><p><a href="https://www.bankinfosecurity.com/russian-hackers-accused-in-wave-water-sector-cyberattacks-a-29264" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/russian-hackers-accused-in-wave-water-sector-cyberattacks-a-29264</a></p><p><a href="https://therecord.media/russia-cisco-fsb-static-tundra" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cisco-fsb-static-tundra</a></p><p><a href="https://therecord.media/russia-cyberattack-investment-platform-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cyberattack-investment-platform-ukraine</a></p><p><a href="https://therecord.media/britain-targets-kyrgyz-crypto" rel="noopener noreferrer" target="_blank">https://therecord.media/britain-targets-kyrgyz-crypto</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ai-website-builder-lovable-increasingly-abused-for-malicious-activity/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ai-website-builder-lovable-increasingly-abused-for-malicious-activity/</a></p><p><a href="https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for IT Worker Scams</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 966: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Hackers Accused in Wave of Water Sector Cyberattacks Across US</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Cisco FSB Static Tundra Operation Targets Critical Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Cyberattack Hits Investment Platform in Ukraine Financial Sector</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/belgian-telecom-says-cyberattack-compromised-data-on-850000" rel="noopener noreferrer" target="_blank">https://therecord.media/belgian-telecom-says-cyberattack-compromised-data-on-850000</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-new-actively-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-new-actively-exploited-zero-day/</a></p><p><a href="https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html</a></p><p><a href="https://www.bankinfosecurity.com/russian-hackers-accused-in-wave-water-sector-cyberattacks-a-29264" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/russian-hackers-accused-in-wave-water-sector-cyberattacks-a-29264</a></p><p><a href="https://therecord.media/russia-cisco-fsb-static-tundra" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cisco-fsb-static-tundra</a></p><p><a href="https://therecord.media/russia-cyberattack-investment-platform-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-cyberattack-investment-platform-ukraine</a></p><p><a href="https://therecord.media/britain-targets-kyrgyz-crypto" rel="noopener noreferrer" target="_blank">https://therecord.media/britain-targets-kyrgyz-crypto</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ai-website-builder-lovable-increasingly-abused-for-malicious-activity/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ai-website-builder-lovable-increasingly-abused-for-malicious-activity/</a></p><p><a href="https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cc908de2-eef3-46e7-8e74-2e331984df9f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 21 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cc908de2-eef3-46e7-8e74-2e331984df9f.mp3" length="32758359" type="audio/mpeg"/><itunes:duration>22:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>966</itunes:episode><podcast:episode>966</podcast:episode></item><item><title>Intel Employee Data Exposed, Australia&apos;s TPG Telecom Investigating iiNet Hack, Organizations Hit by SharePoint Attacks, Innotiv Reports Ransomware Attack to SEC</title><itunes:title>Intel Employee Data Exposed, Australia&apos;s TPG Telecom Investigating iiNet Hack, Organizations Hit by SharePoint Attacks, Innotiv Reports Ransomware Attack to SEC</itunes:title><description><![CDATA[<p>🎙️ Intel Employee Data Exposed, Australia TPG Telecom Hacked, UK SharePoint Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 965: Today's episode will discuss the latest news as Intel Employee Data Exposed with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Elastic Rejects Claims of Zero-Day RCE Flaw in Defend EDR Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched in Chrome and Firefox Browsers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apache ActiveMQ Flaw Exploited to Deploy Ransomware in Active Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/</a></p><p><a href="https://therecord.media/drug-development-innotiv-ransomware-sec" rel="noopener noreferrer" target="_blank">https://therecord.media/drug-development-innotiv-ransomware-sec</a></p><p><a href="https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/</a></p><p><a href="https://therecord.media/organizations-united-kingdom-sharepoint" rel="noopener noreferrer" target="_blank">https://therecord.media/organizations-united-kingdom-sharepoint</a></p><p><a href="https://www.bleepingcomputer.com/news/security/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-defend-edr/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-defend-edr/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-chrome-firefox/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-chrome-firefox/</a></p><p><a href="https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html</a></p><p><a href="https://cybersecuritynews.com/paper-werewolf-exploiting-winrar-zero%E2%80%91day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/paper-werewolf-exploiting-winrar-zero%E2%80%91day/</a></p><p><a href="https://www.securityweek.com/rapperbot-botnet-disrupted-american-administrator-indicted/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rapperbot-botnet-disrupted-american-administrator-indicted/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Intel Employee Data Exposed, Australia TPG Telecom Hacked, UK SharePoint Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 965: Today's episode will discuss the latest news as Intel Employee Data Exposed with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Elastic Rejects Claims of Zero-Day RCE Flaw in Defend EDR Platform</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High Severity Vulnerabilities Patched in Chrome and Firefox Browsers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apache ActiveMQ Flaw Exploited to Deploy Ransomware in Active Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/</a></p><p><a href="https://therecord.media/drug-development-innotiv-ransomware-sec" rel="noopener noreferrer" target="_blank">https://therecord.media/drug-development-innotiv-ransomware-sec</a></p><p><a href="https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/</a></p><p><a href="https://therecord.media/organizations-united-kingdom-sharepoint" rel="noopener noreferrer" target="_blank">https://therecord.media/organizations-united-kingdom-sharepoint</a></p><p><a href="https://www.bleepingcomputer.com/news/security/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-defend-edr/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-defend-edr/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-chrome-firefox/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-chrome-firefox/</a></p><p><a href="https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html</a></p><p><a href="https://cybersecuritynews.com/paper-werewolf-exploiting-winrar-zero%E2%80%91day/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/paper-werewolf-exploiting-winrar-zero%E2%80%91day/</a></p><p><a href="https://www.securityweek.com/rapperbot-botnet-disrupted-american-administrator-indicted/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rapperbot-botnet-disrupted-american-administrator-indicted/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e7769081-698c-41ea-b325-0a78a0ccb42b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 20 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e7769081-698c-41ea-b325-0a78a0ccb42b.mp3" length="25188700" type="audio/mpeg"/><itunes:duration>17:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>965</itunes:episode><podcast:episode>965</podcast:episode></item><item><title>Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT</title><itunes:title>Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT</itunes:title><description><![CDATA[<p>🎙️ Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 964: Today's episode will discuss the latest news as Allianz Life 1.1M Records Leaked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hijacked Satellites and Orbiting Space Weapons: Space is the New Battlefield</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Exploit Poses Serious Threat to SAP NetWeaver Instances Worldwide</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PyPI Blocks 1,800 Expired Domain Emails to Prevent Supply Chain Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/1-1-million-unique-records-identified-in-allianz-life-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1-1-million-unique-records-identified-in-allianz-life-data-leak/</a></p><p><a href="https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/</a></p><p><a href="https://therecord.media/uk-agrees-drop-apple-encryption" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-agrees-drop-apple-encryption</a></p><p><a href="https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/</a></p><p><a href="https://www.securityweek.com/hijacked-satellites-and-orbiting-space-weapons-in-the-21st-century-space-is-the-new-battlefield/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hijacked-satellites-and-orbiting-space-weapons-in-the-21st-century-space-is-the-new-battlefield/</a></p><p><a href="https://www.securityweek.com/new-exploit-poses-threat-to-sap-netweaver-instances/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-exploit-poses-threat-to-sap-netweaver-instances/</a></p><p><a href="https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html</a></p><p><a href="https://therecord.media/bangkok-police-sms-scammers-blasting" rel="noopener noreferrer" target="_blank">https://therecord.media/bangkok-police-sms-scammers-blasting</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/uk-sentences-serial-hacker-of-3-000-sites-to-20-months-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/uk-sentences-serial-hacker-of-3-000-sites-to-20-months-in-prison/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 964: Today's episode will discuss the latest news as Allianz Life 1.1M Records Leaked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hijacked Satellites and Orbiting Space Weapons: Space is the New Battlefield</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Exploit Poses Serious Threat to SAP NetWeaver Instances Worldwide</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PyPI Blocks 1,800 Expired Domain Emails to Prevent Supply Chain Attacks</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/1-1-million-unique-records-identified-in-allianz-life-data-leak/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1-1-million-unique-records-identified-in-allianz-life-data-leak/</a></p><p><a href="https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/</a></p><p><a href="https://therecord.media/uk-agrees-drop-apple-encryption" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-agrees-drop-apple-encryption</a></p><p><a href="https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/</a></p><p><a href="https://www.securityweek.com/hijacked-satellites-and-orbiting-space-weapons-in-the-21st-century-space-is-the-new-battlefield/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hijacked-satellites-and-orbiting-space-weapons-in-the-21st-century-space-is-the-new-battlefield/</a></p><p><a href="https://www.securityweek.com/new-exploit-poses-threat-to-sap-netweaver-instances/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-exploit-poses-threat-to-sap-netweaver-instances/</a></p><p><a href="https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html</a></p><p><a href="https://therecord.media/bangkok-police-sms-scammers-blasting" rel="noopener noreferrer" target="_blank">https://therecord.media/bangkok-police-sms-scammers-blasting</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/uk-sentences-serial-hacker-of-3-000-sites-to-20-months-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/uk-sentences-serial-hacker-of-3-000-sites-to-20-months-in-prison/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">05fa444e-fd52-4fc1-a711-d8c1c9b0b0d5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 19 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/05fa444e-fd52-4fc1-a711-d8c1c9b0b0d5.mp3" length="27152273" type="audio/mpeg"/><itunes:duration>18:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>964</itunes:episode><podcast:episode>964</podcast:episode></item><item><title>Workday Data Breach, Hackers Compromise Canada House of Commons Parliamentary Systems, Colt Telecom Attack, US Seizes $2.8 Million from Zeppelin Ransomware</title><itunes:title>Workday Data Breach, Hackers Compromise Canada House of Commons Parliamentary Systems, Colt Telecom Attack, US Seizes $2.8 Million from Zeppelin Ransomware</itunes:title><description><![CDATA[<p>🎙️ Workday Salesforce Breach, Canada Parliament Hacked, US Seizes $2.8M Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 963: Today's episode will discuss the latest news as Workday Salesforce Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Compromise Canada House of Commons Parliamentary Systems</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Hotel Guests Face Possible Data Breach Exposing Personal IDs</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Turkish Crypto Exchange Warns Customers of Major Cyber Incident</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/workday-data-breach-bears-signs-of-widespread-salesforce-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/workday-data-breach-bears-signs-of-widespread-salesforce-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale/</a></p><p><a href="https://therecord.media/hackers-compromise-canada-house-of-commons" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-compromise-canada-house-of-commons</a></p><p><a href="https://therecord.media/italy-hotel-guests-possible-data-breach-ids" rel="noopener noreferrer" target="_blank">https://therecord.media/italy-hotel-guests-possible-data-breach-ids</a></p><p><a href="https://therecord.media/turkish-crypto-exchange-warns-cyber-incident" rel="noopener noreferrer" target="_blank">https://therecord.media/turkish-crypto-exchange-warns-cyber-incident</a></p><p><a href="https://www.securityweek.com/web-hosting-firms-in-taiwan-attacked-by-chinese-apt-for-access-to-high-value-targets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/web-hosting-firms-in-taiwan-attacked-by-chinese-apt-for-access-to-high-value-targets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/plex-warns-users-to-patch-security-vulnerability-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/plex-warns-users-to-patch-security-vulnerability-immediately/</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-firewall-management-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerability-in-firewall-management-platform/</a></p><p><a href="https://www.securityweek.com/us-seizes-2-8-million-from-zeppelin-ransomware-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-seizes-2-8-million-from-zeppelin-ransomware-operator/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-sanctions-grinex-crypto-exchange-garantexs-successor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-sanctions-grinex-crypto-exchange-garantexs-successor/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Workday Salesforce Breach, Canada Parliament Hacked, US Seizes $2.8M Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 963: Today's episode will discuss the latest news as Workday Salesforce Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Compromise Canada House of Commons Parliamentary Systems</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Hotel Guests Face Possible Data Breach Exposing Personal IDs</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Turkish Crypto Exchange Warns Customers of Major Cyber Incident</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/workday-data-breach-bears-signs-of-widespread-salesforce-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/workday-data-breach-bears-signs-of-widespread-salesforce-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale/</a></p><p><a href="https://therecord.media/hackers-compromise-canada-house-of-commons" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-compromise-canada-house-of-commons</a></p><p><a href="https://therecord.media/italy-hotel-guests-possible-data-breach-ids" rel="noopener noreferrer" target="_blank">https://therecord.media/italy-hotel-guests-possible-data-breach-ids</a></p><p><a href="https://therecord.media/turkish-crypto-exchange-warns-cyber-incident" rel="noopener noreferrer" target="_blank">https://therecord.media/turkish-crypto-exchange-warns-cyber-incident</a></p><p><a href="https://www.securityweek.com/web-hosting-firms-in-taiwan-attacked-by-chinese-apt-for-access-to-high-value-targets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/web-hosting-firms-in-taiwan-attacked-by-chinese-apt-for-access-to-high-value-targets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/plex-warns-users-to-patch-security-vulnerability-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/plex-warns-users-to-patch-security-vulnerability-immediately/</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-firewall-management-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerability-in-firewall-management-platform/</a></p><p><a href="https://www.securityweek.com/us-seizes-2-8-million-from-zeppelin-ransomware-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-seizes-2-8-million-from-zeppelin-ransomware-operator/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-sanctions-grinex-crypto-exchange-garantexs-successor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-sanctions-grinex-crypto-exchange-garantexs-successor/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">50e56375-7bd6-4dea-8a18-42f4ecfc6aad</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 18 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/50e56375-7bd6-4dea-8a18-42f4ecfc6aad.mp3" length="24368038" type="audio/mpeg"/><itunes:duration>16:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>963</itunes:episode><podcast:episode>963</podcast:episode></item><item><title>PA Attorney General&apos;s Down After Cyberattack, Pro-Russian Hackers Were Likely Behind Suspected Dam Sabotage, Fortinet Warns of Pre-Auth RCE Flaw, N-able N-Central Flaws Exploited in Zero-Day Attacks</title><itunes:title>PA Attorney General&apos;s Down After Cyberattack, Pro-Russian Hackers Were Likely Behind Suspected Dam Sabotage, Fortinet Warns of Pre-Auth RCE Flaw, N-able N-Central Flaws Exploited in Zero-Day Attacks</itunes:title><description><![CDATA[<p>🎙️ PA Attorney General Site Down, Russian Hackers Hit Norwegian Dam, Fortinet RCE Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 962: Today's episode will discuss the latest news as PA Attorney General Site Down with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, NVIDIA</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet Warns of FortiSIEM Pre-Auth RCE Flaw with Exploit in the Wild</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Passkey Login Bypassed via WebAuthn Process Manipulation Technique</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/</a></p><p><a href="https://therecord.media/zelle-lawsuit-new-york-state-scams-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/zelle-lawsuit-new-york-state-scams-fraud</a></p><p><a href="https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-n-able-n-central-flaws-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-n-able-n-central-flaws-exploited-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-many-vulnerabilities-addressed-by-intel-amd-nvidia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-many-vulnerabilities-addressed-by-intel-amd-nvidia/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/</a></p><p><a href="https://www.securityweek.com/passkey-login-bypassed-via-webauthn-process-manipulation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/passkey-login-bypassed-via-webauthn-process-manipulation/</a></p><p><a href="https://www.securityweek.com/norwegian-police-say-pro-russian-hackers-were-likely-behind-suspected-sabotage-at-a-dam/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/norwegian-police-say-pro-russian-hackers-were-likely-behind-suspected-sabotage-at-a-dam/</a></p><p><a href="https://therecord.media/charon-ransomware-targeting-middle-east-aviation" rel="noopener noreferrer" target="_blank">https://therecord.media/charon-ransomware-targeting-middle-east-aviation</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ PA Attorney General Site Down, Russian Hackers Hit Norwegian Dam, Fortinet RCE Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 962: Today's episode will discuss the latest news as PA Attorney General Site Down with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, NVIDIA</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet Warns of FortiSIEM Pre-Auth RCE Flaw with Exploit in the Wild</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Passkey Login Bypassed via WebAuthn Process Manipulation Technique</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/</a></p><p><a href="https://therecord.media/zelle-lawsuit-new-york-state-scams-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/zelle-lawsuit-new-york-state-scams-fraud</a></p><p><a href="https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-n-able-n-central-flaws-exploited-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-n-able-n-central-flaws-exploited-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-many-vulnerabilities-addressed-by-intel-amd-nvidia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-many-vulnerabilities-addressed-by-intel-amd-nvidia/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/</a></p><p><a href="https://www.securityweek.com/passkey-login-bypassed-via-webauthn-process-manipulation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/passkey-login-bypassed-via-webauthn-process-manipulation/</a></p><p><a href="https://www.securityweek.com/norwegian-police-say-pro-russian-hackers-were-likely-behind-suspected-sabotage-at-a-dam/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/norwegian-police-say-pro-russian-hackers-were-likely-behind-suspected-sabotage-at-a-dam/</a></p><p><a href="https://therecord.media/charon-ransomware-targeting-middle-east-aviation" rel="noopener noreferrer" target="_blank">https://therecord.media/charon-ransomware-targeting-middle-east-aviation</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f68a3519-6aee-400f-a830-06d0162db32b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 14 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f68a3519-6aee-400f-a830-06d0162db32b.mp3" length="24494679" type="audio/mpeg"/><itunes:duration>17:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>962</itunes:episode><podcast:episode>962</podcast:episode></item><item><title>Massive Patch Tuesday Roundup, Allianz Life Data Leaked, K-pop Site Hit Twice by Cyberattacks</title><itunes:title>Massive Patch Tuesday Roundup, Allianz Life Data Leaked, K-pop Site Hit Twice by Cyberattacks</itunes:title><description><![CDATA[<p>🎙️ Massive Patch Tuesday Roundup, Allianz Life Data Leaked, K-pop Site Hit Twice by Cyberattacks</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 961: Today's episode will discuss the latest news as Massive Patch Tuesday Roundup with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft August 2025 Patch Tuesday Fixes One Zero-Day and 107 Security Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Patches Over 60 Vulnerabilities Across 13 Different Products</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet and Ivanti Release August 2025 Security Patches for Critical Vulnerabilities</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2025-patch-tuesday-fixes-one-zero-day-107-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2025-patch-tuesday-fixes-one-zero-day-107-flaws/</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-release-august-2025-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-release-august-2025-security-patches/</a></p><p><a href="https://www.securityweek.com/adobe-patches-over-60-vulnerabilities-across-13-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-over-60-vulnerabilities-across-13-products/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-s-4hana-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-s-4hana-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-major-vendors-address-code-execution-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-major-vendors-address-code-execution-vulnerabilities/</a></p><p><a href="https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected" rel="noopener noreferrer" target="_blank">https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-leak-allianz-life-data-stolen-in-salesforce-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-leak-allianz-life-data-stolen-in-salesforce-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/</a></p><p><a href="https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html</a></p><p><a href="https://therecord.media/def-con-franklin-water-utility-cybersecurity-volunteers" rel="noopener noreferrer" target="_blank">https://therecord.media/def-con-franklin-water-utility-cybersecurity-volunteers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Massive Patch Tuesday Roundup, Allianz Life Data Leaked, K-pop Site Hit Twice by Cyberattacks</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 961: Today's episode will discuss the latest news as Massive Patch Tuesday Roundup with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft August 2025 Patch Tuesday Fixes One Zero-Day and 107 Security Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Patches Over 60 Vulnerabilities Across 13 Different Products</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet and Ivanti Release August 2025 Security Patches for Critical Vulnerabilities</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2025-patch-tuesday-fixes-one-zero-day-107-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2025-patch-tuesday-fixes-one-zero-day-107-flaws/</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-release-august-2025-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-release-august-2025-security-patches/</a></p><p><a href="https://www.securityweek.com/adobe-patches-over-60-vulnerabilities-across-13-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-over-60-vulnerabilities-across-13-products/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-s-4hana-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-s-4hana-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-major-vendors-address-code-execution-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-major-vendors-address-code-execution-vulnerabilities/</a></p><p><a href="https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected" rel="noopener noreferrer" target="_blank">https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-leak-allianz-life-data-stolen-in-salesforce-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-leak-allianz-life-data-stolen-in-salesforce-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/</a></p><p><a href="https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html</a></p><p><a href="https://therecord.media/def-con-franklin-water-utility-cybersecurity-volunteers" rel="noopener noreferrer" target="_blank">https://therecord.media/def-con-franklin-water-utility-cybersecurity-volunteers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0549960d-bb66-4a5b-85de-b2d99d6eea3a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 13 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0549960d-bb66-4a5b-85de-b2d99d6eea3a.mp3" length="26411858" type="audio/mpeg"/><itunes:duration>18:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>961</itunes:episode><podcast:episode>961</podcast:episode></item><item><title>North Korean Kimsuky Hackers Exposed in Alleged Data Breach, Ransomware Gang Behind Minnesota Attack Identified, Netherlands Reports Citrix NetScaler Flaw Exploited to Breach Organizations, US Charges Ghanaians Linked to Theft of $100 Million in Romance Scams</title><itunes:title>North Korean Kimsuky Hackers Exposed in Alleged Data Breach, Ransomware Gang Behind Minnesota Attack Identified, Netherlands Reports Citrix NetScaler Flaw Exploited to Breach Organizations, US Charges Ghanaians Linked to Theft of $100 Million in Romance Scams</itunes:title><description><![CDATA[<p>🎙️ North Korean Kimsuky Hackers Exposed, Minnesota Ransomware Gang ID'd, Citrix NetScaler Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 960: Today's episode will discuss the latest news as North Korean Kimsuky Hackers Exposed with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OT Networks Targeted in Widespread Exploitation of Erlang OTP Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SonicWall Says Recent Attack Wave Involved Previously Disclosed Flaw, Not Zero-Day</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Charges Ghanaians Linked to Theft of $100 Million in Romance Scams and BEC Attacks</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/</a></p><p><a href="https://therecord.media/ransomware-gang-behind-minnesota-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-gang-behind-minnesota-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/</a></p><p><a href="https://www.securityweek.com/ot-networks-targeted-in-widespread-exploitation-of-erlang-otp-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ot-networks-targeted-in-widespread-exploitation-of-erlang-otp-vulnerability/</a></p><p><a href="https://www.cybersecuritydive.com/news/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-z/757067/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-z/757067/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-ghanaians-linked-to-theft-of-100-million-in-romance-scams-bec-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-ghanaians-linked-to-theft-of-100-million-in-romance-scams-bec-attacks/</a></p><p><a href="https://therecord.media/wikipedia-loses-challenge-online-safety-act-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/wikipedia-loses-challenge-online-safety-act-uk</a></p><p><a href="https://www.bleepingcomputer.com/news/security/muddywaters-darkbit-ransomware-cracked-for-free-data-recovery/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/muddywaters-darkbit-ransomware-cracked-for-free-data-recovery/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ North Korean Kimsuky Hackers Exposed, Minnesota Ransomware Gang ID'd, Citrix NetScaler Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 960: Today's episode will discuss the latest news as North Korean Kimsuky Hackers Exposed with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OT Networks Targeted in Widespread Exploitation of Erlang OTP Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SonicWall Says Recent Attack Wave Involved Previously Disclosed Flaw, Not Zero-Day</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Charges Ghanaians Linked to Theft of $100 Million in Romance Scams and BEC Attacks</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/</a></p><p><a href="https://therecord.media/ransomware-gang-behind-minnesota-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-gang-behind-minnesota-attack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/</a></p><p><a href="https://www.securityweek.com/ot-networks-targeted-in-widespread-exploitation-of-erlang-otp-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ot-networks-targeted-in-widespread-exploitation-of-erlang-otp-vulnerability/</a></p><p><a href="https://www.cybersecuritydive.com/news/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-z/757067/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-z/757067/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-ghanaians-linked-to-theft-of-100-million-in-romance-scams-bec-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-ghanaians-linked-to-theft-of-100-million-in-romance-scams-bec-attacks/</a></p><p><a href="https://therecord.media/wikipedia-loses-challenge-online-safety-act-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/wikipedia-loses-challenge-online-safety-act-uk</a></p><p><a href="https://www.bleepingcomputer.com/news/security/muddywaters-darkbit-ransomware-cracked-for-free-data-recovery/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/muddywaters-darkbit-ransomware-cracked-for-free-data-recovery/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6081b498-7c72-4f3b-8d29-0c2fefb3ca56</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 12 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6081b498-7c72-4f3b-8d29-0c2fefb3ca56.mp3" length="26648214" type="audio/mpeg"/><itunes:duration>18:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>960</itunes:episode><podcast:episode>960</podcast:episode></item><item><title>Columbia University Data Breach Impacts 860,000 Individuals, Google Confirms Data Breach Exposed Google Ads Customers, US Judiciary Confirms Breach, Russian Hackers Exploited WinRAR Zero-Day</title><itunes:title>Columbia University Data Breach Impacts 860,000 Individuals, Google Confirms Data Breach Exposed Google Ads Customers, US Judiciary Confirms Breach, Russian Hackers Exploited WinRAR Zero-Day</itunes:title><description><![CDATA[<p>🎙️ Columbia University 860K Breach, Google Ads Data Exposed, US Judiciary Hacked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 959: Today's episode will discuss the latest news as Columbia University Data Breach Impacts 860,000 Individuals with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australian Privacy Regulator Sues Optus Over Massive 2022 Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe and Canada</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 29,000 Exchange Servers Remain Unpatched Against High Severity Flaw</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/columbia-university-data-breach-impacts-860000/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/columbia-university-data-breach-impacts-860000/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-confirms-data-breach-exposed-potential-google-ads-customers-info/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-confirms-data-breach-exposed-potential-google-ads-customers-info/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/</a></p><p><a href="https://www.bankinfosecurity.com/australian-privacy-regulator-sues-optus-over-2022-hack-a-29162" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australian-privacy-regulator-sues-optus-over-2022-hack-a-29162</a></p><p><a href="https://www.securityweek.com/russian-hackers-exploited-winrar-zero-day-in-attacks-on-europe-canada/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-exploited-winrar-zero-day-in-attacks-on-europe-canada/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/</a></p><p><a href="https://www.securityweek.com/red-teams-breach-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/red-teams-breach-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise/</a></p><p><a href="https://therecord.media/embargo-ransomware-gang-blackcat-alphv-successor" rel="noopener noreferrer" target="_blank">https://therecord.media/embargo-ransomware-gang-blackcat-alphv-successor</a></p><p><a href="https://www.securityweek.com/help-desk-at-risk-scattered-spider-shines-light-on-overlook-threat-vector/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/help-desk-at-risk-scattered-spider-shines-light-on-overlook-threat-vector/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Columbia University 860K Breach, Google Ads Data Exposed, US Judiciary Hacked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 959: Today's episode will discuss the latest news as Columbia University Data Breach Impacts 860,000 Individuals with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australian Privacy Regulator Sues Optus Over Massive 2022 Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe and Canada</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Over 29,000 Exchange Servers Remain Unpatched Against High Severity Flaw</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/columbia-university-data-breach-impacts-860000/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/columbia-university-data-breach-impacts-860000/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-confirms-data-breach-exposed-potential-google-ads-customers-info/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-confirms-data-breach-exposed-potential-google-ads-customers-info/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/</a></p><p><a href="https://www.bankinfosecurity.com/australian-privacy-regulator-sues-optus-over-2022-hack-a-29162" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australian-privacy-regulator-sues-optus-over-2022-hack-a-29162</a></p><p><a href="https://www.securityweek.com/russian-hackers-exploited-winrar-zero-day-in-attacks-on-europe-canada/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-exploited-winrar-zero-day-in-attacks-on-europe-canada/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/</a></p><p><a href="https://www.securityweek.com/red-teams-breach-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/red-teams-breach-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise/</a></p><p><a href="https://therecord.media/embargo-ransomware-gang-blackcat-alphv-successor" rel="noopener noreferrer" target="_blank">https://therecord.media/embargo-ransomware-gang-blackcat-alphv-successor</a></p><p><a href="https://www.securityweek.com/help-desk-at-risk-scattered-spider-shines-light-on-overlook-threat-vector/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/help-desk-at-risk-scattered-spider-shines-light-on-overlook-threat-vector/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cd77d019-d338-48f0-bad4-1550629d0cb6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 11 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cd77d019-d338-48f0-bad4-1550629d0cb6.mp3" length="25808116" type="audio/mpeg"/><itunes:duration>17:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>959</itunes:episode><podcast:episode>959</podcast:episode></item><item><title>Air France-KLM Confirms Breach, Bouygues Telecom France Suffers Cyberattack and Data Breach, Google Discloses Salesforce Hack, Microsoft Warns of High Severity Flaw in Hybrid Exchange Deployments</title><itunes:title>Air France-KLM Confirms Breach, Bouygues Telecom France Suffers Cyberattack and Data Breach, Google Discloses Salesforce Hack, Microsoft Warns of High Severity Flaw in Hybrid Exchange Deployments</itunes:title><description><![CDATA[<p>🎙️ Air France-KLM Hacked, Google Discloses Salesforce Breach, Akira Disables Defender</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 958: Today's episode will discuss the latest news as Air France-KLM Hacked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Warns of High Severity Flaw in Hybrid Exchange Deployments</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Major Enterprise AI Assistants Abused for Data Theft and Manipulations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;August 2025 Android Security Bulletin Patches Critical Vulnerabilities</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/air-france-klm-say-hackers-accessed-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/air-france-klm-say-hackers-accessed-customer-data/</a></p><p><a href="https://therecord.media/bouygues-telecom-france-cyberattack-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/bouygues-telecom-france-cyberattack-data-breach</a></p><p><a href="https://www.securityweek.com/google-discloses-salesforce-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-discloses-salesforce-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/</a></p><p><a href="https://www.securityweek.com/major-enterprise-ai-assistants-abused-for-data-theft-manipulation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/major-enterprise-ai-assistants-abused-for-data-theft-manipulation/</a></p><p><a href="https://thecyberexpress.com/august-2025-android-security-bulletin/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/august-2025-android-security-bulletin/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/</a></p><p><a href="https://www.securityweek.com/enterprise-secrets-exposed-by-cyberark-conjur-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/enterprise-secrets-exposed-by-cyberark-conjur-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/mcp-protocol-bug-let-attackers-execute-code-in-cursor-a-29140" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/mcp-protocol-bug-let-attackers-execute-code-in-cursor-a-29140</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Air France-KLM Hacked, Google Discloses Salesforce Breach, Akira Disables Defender</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 958: Today's episode will discuss the latest news as Air France-KLM Hacked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Warns of High Severity Flaw in Hybrid Exchange Deployments</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Major Enterprise AI Assistants Abused for Data Theft and Manipulations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;August 2025 Android Security Bulletin Patches Critical Vulnerabilities</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/air-france-klm-say-hackers-accessed-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/air-france-klm-say-hackers-accessed-customer-data/</a></p><p><a href="https://therecord.media/bouygues-telecom-france-cyberattack-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/bouygues-telecom-france-cyberattack-data-breach</a></p><p><a href="https://www.securityweek.com/google-discloses-salesforce-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-discloses-salesforce-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/</a></p><p><a href="https://www.securityweek.com/major-enterprise-ai-assistants-abused-for-data-theft-manipulation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/major-enterprise-ai-assistants-abused-for-data-theft-manipulation/</a></p><p><a href="https://thecyberexpress.com/august-2025-android-security-bulletin/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/august-2025-android-security-bulletin/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/</a></p><p><a href="https://www.securityweek.com/enterprise-secrets-exposed-by-cyberark-conjur-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/enterprise-secrets-exposed-by-cyberark-conjur-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/mcp-protocol-bug-let-attackers-execute-code-in-cursor-a-29140" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/mcp-protocol-bug-let-attackers-execute-code-in-cursor-a-29140</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">63675ea3-2653-457e-b83d-0071c2bf63d8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 07 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/63675ea3-2653-457e-b83d-0071c2bf63d8.mp3" length="26806202" type="audio/mpeg"/><itunes:duration>18:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>958</itunes:episode><podcast:episode>958</podcast:episode></item><item><title>Cisco Confirms User Data Stolen in CRM Hack, Pandora Confirms Data Breach Amid Salesforce Data Theft, DaVita Dialysis Company Hit by Ransomware Attack, PBS Confirms Data Breach After Employee Info Leaked</title><itunes:title>Cisco Confirms User Data Stolen in CRM Hack, Pandora Confirms Data Breach Amid Salesforce Data Theft, DaVita Dialysis Company Hit by Ransomware Attack, PBS Confirms Data Breach After Employee Info Leaked</itunes:title><description><![CDATA[<p>🎙️ Cisco CRM Hacked, Pandora Data Breach, PBS Employee Info Leaked, Dell Flaw Hits 100 Models</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 957: Today's episode will discuss the latest news as Cisco CRM Hacked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DaVita Dialysis Company Hit by Ransomware Attack, Sends Data Breach Notifications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PBS Confirms Data Breach After Employee Info Leaked on Discord Servers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Big Sleep AI Finds 20 Critical Vulnerabilities in Open Source Projects</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-says-user-data-stolen-in-crm-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-says-user-data-stolen-in-crm-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/davita-dialysis-company-ransomware-attack-data-breach-notifications" rel="noopener noreferrer" target="_blank">https://therecord.media/davita-dialysis-company-ransomware-attack-data-breach-notifications</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pbs-confirms-data-breach-after-employee-info-leaked-on-discord-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pbs-confirms-data-breach-after-employee-info-leaked-on-discord-servers/</a></p><p><a href="https://thecyberexpress.com/google-big-sleep-finds-20-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-big-sleep-finds-20-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/flaws-expose-100-dell-laptop-models-to-implants-windows-login-bypass/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/flaws-expose-100-dell-laptop-models-to-implants-windows-login-bypass/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/adobe-issues-out-of-band-patches-for-aem-forms-vulnerabilities-with-public-poc/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-issues-out-of-band-patches-for-aem-forms-vulnerabilities-with-public-poc/</a></p><p><a href="https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia" rel="noopener noreferrer" target="_blank">https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cisco CRM Hacked, Pandora Data Breach, PBS Employee Info Leaked, Dell Flaw Hits 100 Models</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 957: Today's episode will discuss the latest news as Cisco CRM Hacked with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DaVita Dialysis Company Hit by Ransomware Attack, Sends Data Breach Notifications</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PBS Confirms Data Breach After Employee Info Leaked on Discord Servers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Big Sleep AI Finds 20 Critical Vulnerabilities in Open Source Projects</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-says-user-data-stolen-in-crm-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-says-user-data-stolen-in-crm-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/davita-dialysis-company-ransomware-attack-data-breach-notifications" rel="noopener noreferrer" target="_blank">https://therecord.media/davita-dialysis-company-ransomware-attack-data-breach-notifications</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pbs-confirms-data-breach-after-employee-info-leaked-on-discord-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pbs-confirms-data-breach-after-employee-info-leaked-on-discord-servers/</a></p><p><a href="https://thecyberexpress.com/google-big-sleep-finds-20-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-big-sleep-finds-20-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/flaws-expose-100-dell-laptop-models-to-implants-windows-login-bypass/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/flaws-expose-100-dell-laptop-models-to-implants-windows-login-bypass/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/adobe-issues-out-of-band-patches-for-aem-forms-vulnerabilities-with-public-poc/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-issues-out-of-band-patches-for-aem-forms-vulnerabilities-with-public-poc/</a></p><p><a href="https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia" rel="noopener noreferrer" target="_blank">https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8678364d-c1c1-434c-8a28-8eafe104d81e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 06 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8678364d-c1c1-434c-8a28-8eafe104d81e.mp3" length="22426636" type="audio/mpeg"/><itunes:duration>15:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>957</itunes:episode><podcast:episode>957</podcast:episode></item><item><title>Chanel Hit in Wave of Salesforce Data Theft Attacks, SonicWall Possible Zero-Day Discovered in Firewalls SSL VPN, Biggest Crypto Hack Ever Targets Chinese Bitcoin Mining Pool, New Plague Malware Backdoors Linux Devices</title><itunes:title>Chanel Hit in Wave of Salesforce Data Theft Attacks, SonicWall Possible Zero-Day Discovered in Firewalls SSL VPN, Biggest Crypto Hack Ever Targets Chinese Bitcoin Mining Pool, New Plague Malware Backdoors Linux Devices</itunes:title><description><![CDATA[<p>Chanel Hit in Salesforce Breach, SonicWall Zero-Day Found, Biggest Crypto Hack Ever</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 956: Today's episode will discuss the latest news as Chanel Hit in Salesforce Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Presses NVIDIA Over Alleged Backdoors in H20 Chips Amid Tech Tensions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Plague Malware Backdoors Linux Devices, Removes SSH Session Traces</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hacked-crimean-servers-abducted-children" rel="noopener noreferrer" target="_blank">https://therecord.media/hacked-crimean-servers-abducted-children</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/jury-verdict-meta-flo-app-data-privacy-case" rel="noopener noreferrer" target="_blank">https://therecord.media/jury-verdict-meta-flo-app-data-privacy-case</a></p><p><a href="https://therecord.media/sonicwall-possible-zero-day-gen-7-firewalls-ssl-vpn" rel="noopener noreferrer" target="_blank">https://therecord.media/sonicwall-possible-zero-day-gen-7-firewalls-ssl-vpn</a></p><p><a href="https://beincrypto.com/biggest-crypto-hack-ever-chinese-bitcoin-mining-pool/" rel="noopener noreferrer" target="_blank">https://beincrypto.com/biggest-crypto-hack-ever-chinese-bitcoin-mining-pool/</a></p><p><a href="https://www.securityweek.com/nvidia-triton-vulnerabilities-pose-big-risk-to-ai-models/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-triton-vulnerabilities-pose-big-risk-to-ai-models/</a></p><p><a href="https://securityaffairs.com/180694/intelligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html" rel="noopener noreferrer" target="_blank">https://securityaffairs.com/180694/intelligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/</a></p><p><a href="https://www.securityweek.com/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes/</a></p><p><a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-2025-threat-hunting-report-ai-weapon-target/" rel="noopener noreferrer" target="_blank">https://www.crowdstrike.com/en-us/blog/crowdstrike-2025-threat-hunting-report-ai-weapon-target/</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Chanel Hit in Salesforce Breach, SonicWall Zero-Day Found, Biggest Crypto Hack Ever</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 956: Today's episode will discuss the latest news as Chanel Hit in Salesforce Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Presses NVIDIA Over Alleged Backdoors in H20 Chips Amid Tech Tensions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Plague Malware Backdoors Linux Devices, Removes SSH Session Traces</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hacked-crimean-servers-abducted-children" rel="noopener noreferrer" target="_blank">https://therecord.media/hacked-crimean-servers-abducted-children</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/</a></p><p><a href="https://therecord.media/jury-verdict-meta-flo-app-data-privacy-case" rel="noopener noreferrer" target="_blank">https://therecord.media/jury-verdict-meta-flo-app-data-privacy-case</a></p><p><a href="https://therecord.media/sonicwall-possible-zero-day-gen-7-firewalls-ssl-vpn" rel="noopener noreferrer" target="_blank">https://therecord.media/sonicwall-possible-zero-day-gen-7-firewalls-ssl-vpn</a></p><p><a href="https://beincrypto.com/biggest-crypto-hack-ever-chinese-bitcoin-mining-pool/" rel="noopener noreferrer" target="_blank">https://beincrypto.com/biggest-crypto-hack-ever-chinese-bitcoin-mining-pool/</a></p><p><a href="https://www.securityweek.com/nvidia-triton-vulnerabilities-pose-big-risk-to-ai-models/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-triton-vulnerabilities-pose-big-risk-to-ai-models/</a></p><p><a href="https://securityaffairs.com/180694/intelligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html" rel="noopener noreferrer" target="_blank">https://securityaffairs.com/180694/intelligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/</a></p><p><a href="https://www.securityweek.com/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes/</a></p><p><a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-2025-threat-hunting-report-ai-weapon-target/" rel="noopener noreferrer" target="_blank">https://www.crowdstrike.com/en-us/blog/crowdstrike-2025-threat-hunting-report-ai-weapon-target/</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9a2f446e-5489-430a-a5b9-6f6fabd95297</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 05 Aug 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/9a2f446e-5489-430a-a5b9-6f6fabd95297.mp3" length="28707708" type="audio/mpeg"/><itunes:duration>19:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>956</itunes:episode><podcast:episode>956</podcast:episode></item><item><title>Luxembourg Telecom Suffers Major Outage in Reported Cyberattack, Hackers Leak Purported Aeroflot Passenger Data Online, Russia&apos;s FSB and Turla Launch Espionage Campaign Against Foreign Embassies</title><itunes:title>Luxembourg Telecom Suffers Major Outage in Reported Cyberattack, Hackers Leak Purported Aeroflot Passenger Data Online, Russia&apos;s FSB and Turla Launch Espionage Campaign Against Foreign Embassies</itunes:title><description><![CDATA[<p>🎙️ Luxembourg Telecom Hit, Aeroflot Denial Leads To Data Leak, SharePoint Ransomware Wave</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 955: Today's episode will discuss the latest news as Luxembourg Telecom Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Illumina Reaches False Claims Act Settlement with DOJ Over Cybersecurity Issues</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Bill Aims to Create National Strategy for Quantum Cybersecurity Migration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sean Cairncross Advances as National Cyber Director Nominee in Senate Confirmation</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/luxembourg-telecom-outage-reported-cyberattack-huawei-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/luxembourg-telecom-outage-reported-cyberattack-huawei-tech</a></p><p><a href="https://therecord.media/hackers-leak-purported-aeroflot-data" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-leak-purported-aeroflot-data</a></p><p><a href="https://therecord.media/russia-fsb-turla-espionage-foreign-embassies-isp-level" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-fsb-turla-espionage-foreign-embassies-isp-level</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/</a></p><p><a href="https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html</a></p><p><a href="https://www.securityweek.com/several-vulnerabilities-patched-in-ai-code-editor-cursor/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/several-vulnerabilities-patched-in-ai-code-editor-cursor/</a></p><p><a href="https://therecord.media/illumina-false-claims-act-doj-cybersecurity-settlement" rel="noopener noreferrer" target="_blank">https://therecord.media/illumina-false-claims-act-doj-cybersecurity-settlement</a></p><p><a href="https://www.securityweek.com/bill-aims-to-create-national-strategy-for-quantum-cybersecurity-migration/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bill-aims-to-create-national-strategy-for-quantum-cybersecurity-migration/</a></p><p><a href="https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-senate-confirmation/756649/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-senate-confirmation/756649/</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-44-deals-announced-in-july-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-44-deals-announced-in-july-2025/</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Luxembourg Telecom Hit, Aeroflot Denial Leads To Data Leak, SharePoint Ransomware Wave</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 955: Today's episode will discuss the latest news as Luxembourg Telecom Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Illumina Reaches False Claims Act Settlement with DOJ Over Cybersecurity Issues</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New Bill Aims to Create National Strategy for Quantum Cybersecurity Migration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sean Cairncross Advances as National Cyber Director Nominee in Senate Confirmation</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/luxembourg-telecom-outage-reported-cyberattack-huawei-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/luxembourg-telecom-outage-reported-cyberattack-huawei-tech</a></p><p><a href="https://therecord.media/hackers-leak-purported-aeroflot-data" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-leak-purported-aeroflot-data</a></p><p><a href="https://therecord.media/russia-fsb-turla-espionage-foreign-embassies-isp-level" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-fsb-turla-espionage-foreign-embassies-isp-level</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/</a></p><p><a href="https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html</a></p><p><a href="https://www.securityweek.com/several-vulnerabilities-patched-in-ai-code-editor-cursor/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/several-vulnerabilities-patched-in-ai-code-editor-cursor/</a></p><p><a href="https://therecord.media/illumina-false-claims-act-doj-cybersecurity-settlement" rel="noopener noreferrer" target="_blank">https://therecord.media/illumina-false-claims-act-doj-cybersecurity-settlement</a></p><p><a href="https://www.securityweek.com/bill-aims-to-create-national-strategy-for-quantum-cybersecurity-migration/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bill-aims-to-create-national-strategy-for-quantum-cybersecurity-migration/</a></p><p><a href="https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-senate-confirmation/756649/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-senate-confirmation/756649/</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-44-deals-announced-in-july-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-44-deals-announced-in-july-2025/</a></p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Threat Locker. <a href="https://www.threatlocker.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.threatlocker.com/cyberhub</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4814b04c-329b-44c6-b993-576cb405210a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 04 Aug 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4814b04c-329b-44c6-b993-576cb405210a.mp3" length="29060047" type="audio/mpeg"/><itunes:duration>20:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>955</itunes:episode><podcast:episode>955</podcast:episode></item><item><title>IBM Reports $5.9M Average Breach Cost, SafePay Threatens 35TB Ingram Micro Leak, ShinyHunters Hit Qantas &amp; Allianz, Palo Alto Buys CyberArk $25B</title><itunes:title>IBM Reports $5.9M Average Breach Cost, SafePay Threatens 35TB Ingram Micro Leak, ShinyHunters Hit Qantas &amp; Allianz, Palo Alto Buys CyberArk $25B</itunes:title><description><![CDATA[<p>🎙️ $5.9M Breach Costs by IBM, 35TB Ingram Micro Threat, Palo Alto Buys CyberArk $25B</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 954: Today's episode will discuss the latest news as Orange Telecom France Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ShinyHunters Behind Salesforce Data Theft Attacks at Qantas, Allianz Life, and LVMH</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patents Reveal Silk Typhoon Company Operations in Beijing</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple Patches Security Flaw Exploited in Chrome Zero-Day Attacks</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ibm-data-breach-report-us-losses" rel="noopener noreferrer" target="_blank">https://therecord.media/ibm-data-breach-report-us-losses</a></p><p><a href="https://www.bleepingcomputer.com/news/security/safepay-ransomware-threatens-to-leak-35tb-of-ingram-micro-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/safepay-ransomware-threatens-to-leak-35tb-of-ingram-micro-data/</a></p><p><a href="https://therecord.media/dollar-tree-discount-stolen-data" rel="noopener noreferrer" target="_blank">https://therecord.media/dollar-tree-discount-stolen-data</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/</a></p><p><a href="https://therecord.media/patents-silk-typhoon-company-beijing" rel="noopener noreferrer" target="_blank">https://therecord.media/patents-silk-typhoon-company-beijing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-patches-security-flaw-exploited-in-chrome-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-patches-security-flaw-exploited-in-chrome-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-to-acquire-cyberark-for-25-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-to-acquire-cyberark-for-25-billion/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/</a></p><p><a href="https://therecord.media/plankey-advances-cisa-nomination" rel="noopener noreferrer" target="_blank">https://therecord.media/plankey-advances-cisa-nomination</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ $5.9M Breach Costs by IBM, 35TB Ingram Micro Threat, Palo Alto Buys CyberArk $25B</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 954: Today's episode will discuss the latest news as Orange Telecom France Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ShinyHunters Behind Salesforce Data Theft Attacks at Qantas, Allianz Life, and LVMH</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patents Reveal Silk Typhoon Company Operations in Beijing</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Apple Patches Security Flaw Exploited in Chrome Zero-Day Attacks</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ibm-data-breach-report-us-losses" rel="noopener noreferrer" target="_blank">https://therecord.media/ibm-data-breach-report-us-losses</a></p><p><a href="https://www.bleepingcomputer.com/news/security/safepay-ransomware-threatens-to-leak-35tb-of-ingram-micro-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/safepay-ransomware-threatens-to-leak-35tb-of-ingram-micro-data/</a></p><p><a href="https://therecord.media/dollar-tree-discount-stolen-data" rel="noopener noreferrer" target="_blank">https://therecord.media/dollar-tree-discount-stolen-data</a></p><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/</a></p><p><a href="https://therecord.media/patents-silk-typhoon-company-beijing" rel="noopener noreferrer" target="_blank">https://therecord.media/patents-silk-typhoon-company-beijing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-patches-security-flaw-exploited-in-chrome-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-patches-security-flaw-exploited-in-chrome-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-to-acquire-cyberark-for-25-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-to-acquire-cyberark-for-25-billion/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/</a></p><p><a href="https://therecord.media/plankey-advances-cisa-nomination" rel="noopener noreferrer" target="_blank">https://therecord.media/plankey-advances-cisa-nomination</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1017f8b7-5b52-4b08-8801-3c2787fbbdce</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 31 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1017f8b7-5b52-4b08-8801-3c2787fbbdce.mp3" length="26949144" type="audio/mpeg"/><itunes:duration>18:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>954</itunes:episode><podcast:episode>954</podcast:episode></item><item><title>Orange Telecom France Hit by Cyberattack, Minnesota Governor Activates National Guard, FBI Seizes $24M Bitcoin from Chaos Ransomware</title><itunes:title>Orange Telecom France Hit by Cyberattack, Minnesota Governor Activates National Guard, FBI Seizes $24M Bitcoin from Chaos Ransomware</itunes:title><description><![CDATA[<p>🎙️ Orange Telecom France Hit by Cyberattack, Minnesota Governor Activates National Guard, FBI Seizes $24M Bitcoin from Chaos Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 953: Today's episode will discuss the latest news as Orange Telecom France Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TEA App Takes Messaging System Offline After Second Security Issue Reported</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targeting Snowflake Access for Large-Scale Data Exfiltration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit SAP NetWeaver Bug to Deploy Linux Auto-Color Malware</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/orange-telecom-france-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/orange-telecom-france-cyberattack</a></p><p><a href="https://www.yahoo.com/news/articles/major-cyber-attack-closes-hundreds-125722686.html?guccounter=1" rel="noopener noreferrer" target="_blank">https://www.yahoo.com/news/articles/major-cyber-attack-closes-hundreds-125722686.html?guccounter=1</a></p><p><a href="https://therecord.media/minnesota-governor-activates-national-guard-st-paul-cyber-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/minnesota-governor-activates-national-guard-st-paul-cyber-attack</a></p><p><a href="https://www.securityweek.com/tea-app-takes-messaging-system-offline-after-second-security-issue-reported/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tea-app-takes-messaging-system-offline-after-second-security-issue-reported/</a></p><p><a href="https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration" rel="noopener noreferrer" target="_blank">https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/</a></p><p><a href="https://www.securityweek.com/lenovo-firmware-vulnerabilities-allow-persistent-implant-deployment/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lenovo-firmware-vulnerabilities-allow-persistent-implant-deployment/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomware-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomware-operation/</a></p><p><a href="https://therecord.media/poland-32-suspects-pro-russia-sabotage" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-32-suspects-pro-russia-sabotage</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Orange Telecom France Hit by Cyberattack, Minnesota Governor Activates National Guard, FBI Seizes $24M Bitcoin from Chaos Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 953: Today's episode will discuss the latest news as Orange Telecom France Hit by Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TEA App Takes Messaging System Offline After Second Security Issue Reported</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targeting Snowflake Access for Large-Scale Data Exfiltration</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Exploit SAP NetWeaver Bug to Deploy Linux Auto-Color Malware</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/orange-telecom-france-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/orange-telecom-france-cyberattack</a></p><p><a href="https://www.yahoo.com/news/articles/major-cyber-attack-closes-hundreds-125722686.html?guccounter=1" rel="noopener noreferrer" target="_blank">https://www.yahoo.com/news/articles/major-cyber-attack-closes-hundreds-125722686.html?guccounter=1</a></p><p><a href="https://therecord.media/minnesota-governor-activates-national-guard-st-paul-cyber-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/minnesota-governor-activates-national-guard-st-paul-cyber-attack</a></p><p><a href="https://www.securityweek.com/tea-app-takes-messaging-system-offline-after-second-security-issue-reported/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tea-app-takes-messaging-system-offline-after-second-security-issue-reported/</a></p><p><a href="https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration" rel="noopener noreferrer" target="_blank">https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/</a></p><p><a href="https://www.securityweek.com/lenovo-firmware-vulnerabilities-allow-persistent-implant-deployment/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lenovo-firmware-vulnerabilities-allow-persistent-implant-deployment/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomware-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomware-operation/</a></p><p><a href="https://therecord.media/poland-32-suspects-pro-russia-sabotage" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-32-suspects-pro-russia-sabotage</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3f3efe11-1f64-420c-9ca1-663ba7b740ef</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 30 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3f3efe11-1f64-420c-9ca1-663ba7b740ef.mp3" length="28050049" type="audio/mpeg"/><itunes:duration>19:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>953</itunes:episode><podcast:episode>953</podcast:episode></item><item><title>Aeroflot Cyberattack Causes Flight Delays, French Naval Group 1TB Breach, Cisco ISE Exploited, Apple Intelligence Data Leaked</title><itunes:title>Aeroflot Cyberattack Causes Flight Delays, French Naval Group 1TB Breach, Cisco ISE Exploited, Apple Intelligence Data Leaked</itunes:title><description><![CDATA[<p>🎙️ Aeroflot Cyberattack Causes Flight Delays, French Naval Group 1TB Breach, Cisco ISE Exploited, Apple Intelligence Data Leaked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 952: Today's episode will discuss the latest news as Aeroflot Cyberattack Causes Flight Delays with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targeting VMware vSphere Environments in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploit Available for Critical Cisco ISE Bug Exploited in Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Flags PaperCut RCE Bug as Exploited in Attacks - Patch Now</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyberattack-aeroflot-russia-delays" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-aeroflot-russia-delays</a></p><p><a href="https://www.bleepingcomputer.com/news/security/frances-warship-builder-naval-group-investigates-1tb-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/frances-warship-builder-naval-group-investigates-1tb-data-breach/</a></p><p><a href="https://thecyberexpress.com/nation-group-cyberattacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/nation-group-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/flaw-in-gemini-cli-ai-coding-assistant-allowed-stealthy-code-execution/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/flaw-in-gemini-cli-ai-coding-assistant-allowed-stealthy-code-execution/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data/</a></p><p><a href="https://www.securityweek.com/scattered-spider-targeting-vmware-vsphere-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/scattered-spider-targeting-vmware-vsphere-environments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-papercut-rce-bug-as-exploited-in-attacks-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-papercut-rce-bug-as-exploited-in-attacks-patch-now/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Aeroflot Cyberattack Causes Flight Delays, French Naval Group 1TB Breach, Cisco ISE Exploited, Apple Intelligence Data Leaked</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 952: Today's episode will discuss the latest news as Aeroflot Cyberattack Causes Flight Delays with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targeting VMware vSphere Environments in New Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploit Available for Critical Cisco ISE Bug Exploited in Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Flags PaperCut RCE Bug as Exploited in Attacks - Patch Now</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyberattack-aeroflot-russia-delays" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-aeroflot-russia-delays</a></p><p><a href="https://www.bleepingcomputer.com/news/security/frances-warship-builder-naval-group-investigates-1tb-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/frances-warship-builder-naval-group-investigates-1tb-data-breach/</a></p><p><a href="https://thecyberexpress.com/nation-group-cyberattacks/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/nation-group-cyberattacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/flaw-in-gemini-cli-ai-coding-assistant-allowed-stealthy-code-execution/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/flaw-in-gemini-cli-ai-coding-assistant-allowed-stealthy-code-execution/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data/</a></p><p><a href="https://www.securityweek.com/scattered-spider-targeting-vmware-vsphere-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/scattered-spider-targeting-vmware-vsphere-environments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-papercut-rce-bug-as-exploited-in-attacks-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-flags-papercut-rce-bug-as-exploited-in-attacks-patch-now/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d6182dfd-f344-49a0-ad9b-cb4ae39a952e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 29 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d6182dfd-f344-49a0-ad9b-cb4ae39a952e.mp3" length="25957327" type="audio/mpeg"/><itunes:duration>18:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>952</itunes:episode><podcast:episode>952</podcast:episode></item><item><title>Allianz Life Breaches 1.4M Records, NASCAR Data Stolen, SharePoint Ransomware Attacks, BlackSuit Takedown</title><itunes:title>Allianz Life Breaches 1.4M Records, NASCAR Data Stolen, SharePoint Ransomware Attacks, BlackSuit Takedown</itunes:title><description><![CDATA[<p>🎙️ Allianz Life Breaches 1.4M Records, NASCAR Data Stolen, SharePoint Ransomware Attacks, BlackSuit Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 951: Today's episode will discuss the latest news as Allianz Life Breaches 1.4M Records with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;California Privacy Agency Approves New AI Regulation Rules</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Woman Sentenced to 8 Years for Running Laptop Farm Helping North Koreans</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mitel Patches Critical Flaw in Enterprise Communication Platform</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/allianz-life-confirms-data-breach-impacts-majority-of-14-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/allianz-life-confirms-data-breach-impacts-majority-of-14-million-customers/</a></p><p><a href="https://therecord.media/nascar-confirms-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/nascar-confirms-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-servers-also-targeted-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-servers-also-targeted-in-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/chinese-spies-target-networking-and-virtualization-flaws-to-breach-isolated-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-spies-target-networking-and-virtualization-flaws-to-breach-isolated-environments/</a></p><p><a href="https://therecord.media/california-privacy-agency-approves-ai-rules" rel="noopener noreferrer" target="_blank">https://therecord.media/california-privacy-agency-approves-ai-rules</a></p><p><a href="https://www.ai.gov/#home-services-anchor" rel="noopener noreferrer" target="_blank">https://www.ai.gov/#home-services-anchor</a></p><p><a href="https://therecord.media/blacksuit-ransomware-gang-website-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/blacksuit-ransomware-gang-website-takedown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-woman-sentenced-to-8-years-in-prison-for-running-laptop-farm-helping-north-koreans-infiltrate-300-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-woman-sentenced-to-8-years-in-prison-for-running-laptop-farm-helping-north-koreans-infiltrate-300-firms/</a></p><p><a href="https://www.securityweek.com/mitel-patches-critical-flaw-in-enterprise-communication-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitel-patches-critical-flaw-in-enterprise-communication-platform/</a></p><p><a href="https://www.securityweek.com/no-patch-for-flaw-exposing-hundreds-of-lg-cameras-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/no-patch-for-flaw-exposing-hundreds-of-lg-cameras-to-remote-hacking/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Allianz Life Breaches 1.4M Records, NASCAR Data Stolen, SharePoint Ransomware Attacks, BlackSuit Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 951: Today's episode will discuss the latest news as Allianz Life Breaches 1.4M Records with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;California Privacy Agency Approves New AI Regulation Rules</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Woman Sentenced to 8 Years for Running Laptop Farm Helping North Koreans</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mitel Patches Critical Flaw in Enterprise Communication Platform</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/allianz-life-confirms-data-breach-impacts-majority-of-14-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/allianz-life-confirms-data-breach-impacts-majority-of-14-million-customers/</a></p><p><a href="https://therecord.media/nascar-confirms-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/nascar-confirms-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-servers-also-targeted-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-servers-also-targeted-in-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/chinese-spies-target-networking-and-virtualization-flaws-to-breach-isolated-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-spies-target-networking-and-virtualization-flaws-to-breach-isolated-environments/</a></p><p><a href="https://therecord.media/california-privacy-agency-approves-ai-rules" rel="noopener noreferrer" target="_blank">https://therecord.media/california-privacy-agency-approves-ai-rules</a></p><p><a href="https://www.ai.gov/#home-services-anchor" rel="noopener noreferrer" target="_blank">https://www.ai.gov/#home-services-anchor</a></p><p><a href="https://therecord.media/blacksuit-ransomware-gang-website-takedown" rel="noopener noreferrer" target="_blank">https://therecord.media/blacksuit-ransomware-gang-website-takedown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-woman-sentenced-to-8-years-in-prison-for-running-laptop-farm-helping-north-koreans-infiltrate-300-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-woman-sentenced-to-8-years-in-prison-for-running-laptop-farm-helping-north-koreans-infiltrate-300-firms/</a></p><p><a href="https://www.securityweek.com/mitel-patches-critical-flaw-in-enterprise-communication-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mitel-patches-critical-flaw-in-enterprise-communication-platform/</a></p><p><a href="https://www.securityweek.com/no-patch-for-flaw-exposing-hundreds-of-lg-cameras-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/no-patch-for-flaw-exposing-hundreds-of-lg-cameras-to-remote-hacking/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e5d1f698-d784-4d21-9d57-7cc4a9a565bf</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 28 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e5d1f698-d784-4d21-9d57-7cc4a9a565bf.mp3" length="26942875" type="audio/mpeg"/><itunes:duration>18:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>951</itunes:episode><podcast:episode>951</podcast:episode></item><item><title>US Nuclear Agency HACKED in SharePoint Attacks, Clorox Sues Cognizant for $380M, XSS Leader Captured</title><itunes:title>US Nuclear Agency HACKED in SharePoint Attacks, Clorox Sues Cognizant for $380M, XSS Leader Captured</itunes:title><description><![CDATA[<p>🎙️ US Nuclear Agency HACKED in SharePoint Attacks, Clorox Sues Cognizant for $380M, XSS Leader Captured</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 950: Today's episode will discuss the latest news as US Nuclear Agency HACKED in SharePoint Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NPM Accidentally Removes Stylus Package Breaking Builds and Pipelines</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Operator of JetFlix Illegal Streaming Service Gets 7 Years in Prison</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/</a></p><p><a href="https://therecord.media/clorox-cyberattack-lawsuit-cognizant-it-contractor" rel="noopener noreferrer" target="_blank">https://therecord.media/clorox-cyberattack-lawsuit-cognizant-it-contractor</a></p><p><a href="https://thecyberexpress.com/hongkong-post-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hongkong-post-cyberattack/</a></p><p><a href="https://www.securityweek.com/openais-sam-altman-warns-of-ai-voice-fraud-crisis-in-banking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openais-sam-altman-warns-of-ai-voice-fraud-crisis-in-banking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/npm-accidentally-removes-stylus-package-breaks-builds-and-pipelines/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/npm-accidentally-removes-stylus-package-breaks-builds-and-pipelines/</a></p><p><a href="https://www.securityweek.com/france-says-administrator-of-cybercrime-forum-xss-arrested-in-ukraine/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/france-says-administrator-of-cybercrime-forum-xss-arrested-in-ukraine/</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/operator-of-jetflix-illegal-streaming-service-gets-7-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/operator-of-jetflix-illegal-streaming-service-gets-7-years-in-prison/</a></p><p><a href="https://www.securityweek.com/coyote-banking-trojan-first-to-abuse-microsoft-uia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/coyote-banking-trojan-first-to-abuse-microsoft-uia/</a></p><p><a href="https://therecord.media/new-york-cyber-regulations-water-grants" rel="noopener noreferrer" target="_blank">https://therecord.media/new-york-cyber-regulations-water-grants</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ US Nuclear Agency HACKED in SharePoint Attacks, Clorox Sues Cognizant for $380M, XSS Leader Captured</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 950: Today's episode will discuss the latest news as US Nuclear Agency HACKED in SharePoint Attacks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NPM Accidentally Removes Stylus Package Breaking Builds and Pipelines</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Operator of JetFlix Illegal Streaming Service Gets 7 Years in Prison</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/</a></p><p><a href="https://therecord.media/clorox-cyberattack-lawsuit-cognizant-it-contractor" rel="noopener noreferrer" target="_blank">https://therecord.media/clorox-cyberattack-lawsuit-cognizant-it-contractor</a></p><p><a href="https://thecyberexpress.com/hongkong-post-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hongkong-post-cyberattack/</a></p><p><a href="https://www.securityweek.com/openais-sam-altman-warns-of-ai-voice-fraud-crisis-in-banking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openais-sam-altman-warns-of-ai-voice-fraud-crisis-in-banking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/npm-accidentally-removes-stylus-package-breaks-builds-and-pipelines/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/npm-accidentally-removes-stylus-package-breaks-builds-and-pipelines/</a></p><p><a href="https://www.securityweek.com/france-says-administrator-of-cybercrime-forum-xss-arrested-in-ukraine/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/france-says-administrator-of-cybercrime-forum-xss-arrested-in-ukraine/</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/operator-of-jetflix-illegal-streaming-service-gets-7-years-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/operator-of-jetflix-illegal-streaming-service-gets-7-years-in-prison/</a></p><p><a href="https://www.securityweek.com/coyote-banking-trojan-first-to-abuse-microsoft-uia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/coyote-banking-trojan-first-to-abuse-microsoft-uia/</a></p><p><a href="https://therecord.media/new-york-cyber-regulations-water-grants" rel="noopener noreferrer" target="_blank">https://therecord.media/new-york-cyber-regulations-water-grants</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">eacf46a2-8568-4620-b42f-939d21de1252</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 24 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/eacf46a2-8568-4620-b42f-939d21de1252.mp3" length="27584233" type="audio/mpeg"/><itunes:duration>19:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>950</itunes:episode><podcast:episode>950</podcast:episode></item><item><title>🎙️ Chinese APTs Exploit ToolShell Zero-Days, AMEOS Healthcare Breach, UK Bans Ransomware Payments, Lumma Stealer Returns</title><itunes:title>🎙️ Chinese APTs Exploit ToolShell Zero-Days, AMEOS Healthcare Breach, UK Bans Ransomware Payments, Lumma Stealer Returns</itunes:title><description><![CDATA[<p>🎙️ Chinese APTs Exploit ToolShell Zero-Days, AMEOS Healthcare Breach, UK Bans Ransomware Payments, Lumma Stealer Returns</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 949: Today's episode will discuss the latest news as Chinese APTs Exploit ToolShell Zero-Days with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High-Severity Flaws Patched in Chrome and Firefox Browsers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA and FBI Warn of Escalating Interlock Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lumma Stealer Malware Returns After Law Enforcement Takedown Attempt</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-says-chinese-apts-exploited-toolshell-zero-days-weeks-before-patch/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-says-chinese-apts-exploited-toolshell-zero-days-weeks-before-patch/</a></p><p><a href="https://www.securityweek.com/critical-vulnerabilities-patched-in-sophos-firewall/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerabilities-patched-in-sophos-firewall/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/</a></p><p><a href="https://www.securityweek.com/high-severity-flaws-patched-in-chrome-firefox/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-flaws-patched-in-chrome-firefox/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/lumma-stealer-malware-returns-after-takedown-attempt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lumma-stealer-malware-returns-after-takedown-attempt/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-infrastructure-cybersecurity-federal-support-risk/753686/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-infrastructure-cybersecurity-federal-support-risk/753686/</a></p><p><a href="https://thecyberexpress.com/replit-ai-agent-incident/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/replit-ai-agent-incident/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Chinese APTs Exploit ToolShell Zero-Days, AMEOS Healthcare Breach, UK Bans Ransomware Payments, Lumma Stealer Returns</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 949: Today's episode will discuss the latest news as Chinese APTs Exploit ToolShell Zero-Days with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;High-Severity Flaws Patched in Chrome and Firefox Browsers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA and FBI Warn of Escalating Interlock Ransomware Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lumma Stealer Malware Returns After Law Enforcement Takedown Attempt</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-says-chinese-apts-exploited-toolshell-zero-days-weeks-before-patch/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-says-chinese-apts-exploited-toolshell-zero-days-weeks-before-patch/</a></p><p><a href="https://www.securityweek.com/critical-vulnerabilities-patched-in-sophos-firewall/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerabilities-patched-in-sophos-firewall/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/</a></p><p><a href="https://www.securityweek.com/high-severity-flaws-patched-in-chrome-firefox/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-flaws-patched-in-chrome-firefox/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/</a></p><p><a href="https://www.securityweek.com/lumma-stealer-malware-returns-after-takedown-attempt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lumma-stealer-malware-returns-after-takedown-attempt/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-infrastructure-cybersecurity-federal-support-risk/753686/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-infrastructure-cybersecurity-federal-support-risk/753686/</a></p><p><a href="https://thecyberexpress.com/replit-ai-agent-incident/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/replit-ai-agent-incident/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e899e1b4-cc83-4de1-a9e0-a9ecf7ac259e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 23 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e899e1b4-cc83-4de1-a9e0-a9ecf7ac259e.mp3" length="29923969" type="audio/mpeg"/><itunes:duration>20:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>949</itunes:episode><podcast:episode>949</podcast:episode></item><item><title>China-Linked ToolShell Zero-Days Target High-Value SharePoint Servers, Dell Confirms Test Lab Breach by World Leaks Group, Over 1,000 CrushFTP Servers Exposed to Ongoing Hijack Attacks</title><itunes:title>China-Linked ToolShell Zero-Days Target High-Value SharePoint Servers, Dell Confirms Test Lab Breach by World Leaks Group, Over 1,000 CrushFTP Servers Exposed to Ongoing Hijack Attacks</itunes:title><description><![CDATA[<p>🎙️ China's ToolShell Zero-Days Hit High-Value Targets, Dell &amp; Dior Breached, 1,000+ CrushFTP Servers Compromised</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 948: Today's episode will discuss the latest news as SharePoint Attacks Hit High-Value Targets with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ExpressVPN Bug Leaked User IPs in Remote Desktop Sessions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New DCHSpy Spyware Variants Target Android Users via Iranian APT</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hungary Arrests Suspect in Independent Media Hacking Campaign</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/toolshell-zero-day-attacks-on-sharepoint-first-wave-linked-to-china-hit-high-value-targets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/toolshell-zero-day-attacks-on-sharepoint-first-wave-linked-to-china-hit-high-value-targets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/</a></p><p><a href="https://therecord.media/indian-crypto-dcx-millions-stolen" rel="noopener noreferrer" target="_blank">https://therecord.media/indian-crypto-dcx-millions-stolen</a></p><p><a href="https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html</a></p><p><a href="https://www.securityweek.com/dior-says-personal-information-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dior-says-personal-information-stolen-in-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/</a></p><p><a href="https://www.securityweek.com/new-variants-of-dchspy-spyware-used-by-iranian-apt-to-target-android-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-variants-of-dchspy-spyware-used-by-iranian-apt-to-target-android-users/</a></p><p><a href="https://therecord.media/hungary-arrest-suspect-hacking-independent-media" rel="noopener noreferrer" target="_blank">https://therecord.media/hungary-arrest-suspect-hacking-independent-media</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China's ToolShell Zero-Days Hit High-Value Targets, Dell &amp; Dior Breached, 1,000+ CrushFTP Servers Compromised</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 948: Today's episode will discuss the latest news as SharePoint Attacks Hit High-Value Targets with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ExpressVPN Bug Leaked User IPs in Remote Desktop Sessions</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New DCHSpy Spyware Variants Target Android Users via Iranian APT</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hungary Arrests Suspect in Independent Media Hacking Campaign</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/toolshell-zero-day-attacks-on-sharepoint-first-wave-linked-to-china-hit-high-value-targets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/toolshell-zero-day-attacks-on-sharepoint-first-wave-linked-to-china-hit-high-value-targets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/</a></p><p><a href="https://therecord.media/indian-crypto-dcx-millions-stolen" rel="noopener noreferrer" target="_blank">https://therecord.media/indian-crypto-dcx-millions-stolen</a></p><p><a href="https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html</a></p><p><a href="https://www.securityweek.com/dior-says-personal-information-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dior-says-personal-information-stolen-in-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/</a></p><p><a href="https://www.securityweek.com/new-variants-of-dchspy-spyware-used-by-iranian-apt-to-target-android-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-variants-of-dchspy-spyware-used-by-iranian-apt-to-target-android-users/</a></p><p><a href="https://therecord.media/hungary-arrest-suspect-hacking-independent-media" rel="noopener noreferrer" target="_blank">https://therecord.media/hungary-arrest-suspect-hacking-independent-media</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2d8cb6de-6770-45ac-9973-45f36276bb4a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 22 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2d8cb6de-6770-45ac-9973-45f36276bb4a.mp3" length="23929807" type="audio/mpeg"/><itunes:duration>16:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>948</itunes:episode><podcast:episode>948</podcast:episode></item><item><title>SharePoint Zero-Days Hit 85+ Orgs, Singapore Blames China for Infrastructure Attacks, CrushFTP &amp; FortiWeb Exploited</title><itunes:title>SharePoint Zero-Days Hit 85+ Orgs, Singapore Blames China for Infrastructure Attacks, CrushFTP &amp; FortiWeb Exploited</itunes:title><description><![CDATA[<p>🎙️ SharePoint Zero-Days Hit 85+ Orgs, Singapore Blames China for Infrastructure Attacks, CrushFTP &amp; FortiWeb Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 947: Today's episode will discuss the latest news as SharePoint Zero-Days Hit 85+ Orgs with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hijacking Cursors Agent: How Researchers Took Over EC2 Instance</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft China Employees Face US Military Senate Letter Scrutiny</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Meta Investors and Zuckerberg Settle Major Privacy Lawsuit</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sharepoint-under-attack-microsoft-warns-of-zero-day-exploited-in-the-wild-no-patch-available/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sharepoint-under-attack-microsoft-warns-of-zero-day-exploited-in-the-wild-no-patch-available/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-crushftp-zero-day-exploited-in-attacks-to-hijack-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-crushftp-zero-day-exploited-in-attacks-to-hijack-servers/</a></p><p><a href="https://www.securityweek.com/fortinet-fortiweb-flaw-exploited-in-the-wild-after-poc-publication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-fortiweb-flaw-exploited-in-the-wild-after-poc-publication/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/</a></p><p><a href="https://www.reco.ai/blog/hijacking-cursors-agent-how-we-took-over-an-ec2-instance" rel="noopener noreferrer" target="_blank">https://www.reco.ai/blog/hijacking-cursors-agent-how-we-took-over-an-ec2-instance</a></p><p><a href="https://therecord.media/singapore-accuses-chinese-backed-hackers-critical-infrastructure-attacks" rel="noopener noreferrer" target="_blank">https://therecord.media/singapore-accuses-chinese-backed-hackers-critical-infrastructure-attacks</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-china-employees-us-military-senate-letter/753465/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-china-employees-us-military-senate-letter/753465/</a></p><p><a href="https://therecord.media/meta-investors-zuckerberg-settle-privacy-lawsuit" rel="noopener noreferrer" target="_blank">https://therecord.media/meta-investors-zuckerberg-settle-privacy-lawsuit</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ SharePoint Zero-Days Hit 85+ Orgs, Singapore Blames China for Infrastructure Attacks, CrushFTP &amp; FortiWeb Exploited</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 947: Today's episode will discuss the latest news as SharePoint Zero-Days Hit 85+ Orgs with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hijacking Cursors Agent: How Researchers Took Over EC2 Instance</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft China Employees Face US Military Senate Letter Scrutiny</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Meta Investors and Zuckerberg Settle Major Privacy Lawsuit</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sharepoint-under-attack-microsoft-warns-of-zero-day-exploited-in-the-wild-no-patch-available/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sharepoint-under-attack-microsoft-warns-of-zero-day-exploited-in-the-wild-no-patch-available/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-crushftp-zero-day-exploited-in-attacks-to-hijack-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-crushftp-zero-day-exploited-in-attacks-to-hijack-servers/</a></p><p><a href="https://www.securityweek.com/fortinet-fortiweb-flaw-exploited-in-the-wild-after-poc-publication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-fortiweb-flaw-exploited-in-the-wild-after-poc-publication/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/</a></p><p><a href="https://www.reco.ai/blog/hijacking-cursors-agent-how-we-took-over-an-ec2-instance" rel="noopener noreferrer" target="_blank">https://www.reco.ai/blog/hijacking-cursors-agent-how-we-took-over-an-ec2-instance</a></p><p><a href="https://therecord.media/singapore-accuses-chinese-backed-hackers-critical-infrastructure-attacks" rel="noopener noreferrer" target="_blank">https://therecord.media/singapore-accuses-chinese-backed-hackers-critical-infrastructure-attacks</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-china-employees-us-military-senate-letter/753465/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-china-employees-us-military-senate-letter/753465/</a></p><p><a href="https://therecord.media/meta-investors-zuckerberg-settle-privacy-lawsuit" rel="noopener noreferrer" target="_blank">https://therecord.media/meta-investors-zuckerberg-settle-privacy-lawsuit</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5c2f9ab8-3ccc-4d94-b32b-1273ea983872</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 21 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5c2f9ab8-3ccc-4d94-b32b-1273ea983872.mp3" length="22829530" type="audio/mpeg"/><itunes:duration>15:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>947</itunes:episode><podcast:episode>947</podcast:episode></item><item><title>United Natural Foods Projects Up to $400 Million Sales Hit from June Cyberattack, Co-op Confirms Data of 6.5 Million Members Stolen in Cyberattack, Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime</title><itunes:title>United Natural Foods Projects Up to $400 Million Sales Hit from June Cyberattack, Co-op Confirms Data of 6.5 Million Members Stolen in Cyberattack, Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime</itunes:title><description><![CDATA[<p>🎙️ United Natural Foods $400M Hit from Cyberattack, Co-op 6.5M Members' Data STOLEN, Cambodia Arrests 1,000 Cyber Criminals</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 946: Today's episode will discuss the latest news as United Natural Foods $400M Hit from Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Hackers Target Taiwan's Presidential Office Networks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oracle Patches 200 Vulnerabilities with July 2025 CPU</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches Another Critical ISE Vulnerability</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/united-natural-foods-projects-up-to-400m-sales-hit-from-june-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/united-natural-foods-projects-up-to-400m-sales-hit-from-june-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/</a></p><p><a href="https://thehackernews.com/2025/07/chinese-hackers-target-taiwans.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/chinese-hackers-target-taiwans.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-says-1111-outage-not-caused-by-attack-or-bgp-hijack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflare-says-1111-outage-not-caused-by-attack-or-bgp-hijack/</a></p><p><a href="https://www.securityweek.com/cisco-patches-another-critical-ise-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-another-critical-ise-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-fortinet-fortiweb-hacks-likely-linked-to-public-rce-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-fortinet-fortiweb-hacks-likely-linked-to-public-rce-exploits/</a></p><p><a href="https://www.securityweek.com/oracle-patches-200-vulnerabilities-with-july-2025-cpu/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-200-vulnerabilities-with-july-2025-cpu/</a></p><p><a href="https://www.securityweek.com/trial-opens-against-meta-ceo-mark-zuckerberg-and-other-leaders-over-facebook-privacy-violations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trial-opens-against-meta-ceo-mark-zuckerberg-and-other-leaders-over-facebook-privacy-violations/</a></p><p><a href="https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/</a></p><p><a href="https://www.securityweek.com/cambodia-makes-1000-arrests-in-latest-crackdown-on-cybercrime/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cambodia-makes-1000-arrests-in-latest-crackdown-on-cybercrime/</a></p><p><a href="https://therecord.media/senate-panel-passes-intel-act-salt-typhoon-china" rel="noopener noreferrer" target="_blank">https://therecord.media/senate-panel-passes-intel-act-salt-typhoon-china</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ United Natural Foods $400M Hit from Cyberattack, Co-op 6.5M Members' Data STOLEN, Cambodia Arrests 1,000 Cyber Criminals</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 946: Today's episode will discuss the latest news as United Natural Foods $400M Hit from Cyberattack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Hackers Target Taiwan's Presidential Office Networks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oracle Patches 200 Vulnerabilities with July 2025 CPU</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches Another Critical ISE Vulnerability</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/united-natural-foods-projects-up-to-400m-sales-hit-from-june-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/united-natural-foods-projects-up-to-400m-sales-hit-from-june-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/</a></p><p><a href="https://thehackernews.com/2025/07/chinese-hackers-target-taiwans.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/chinese-hackers-target-taiwans.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-says-1111-outage-not-caused-by-attack-or-bgp-hijack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflare-says-1111-outage-not-caused-by-attack-or-bgp-hijack/</a></p><p><a href="https://www.securityweek.com/cisco-patches-another-critical-ise-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-another-critical-ise-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-fortinet-fortiweb-hacks-likely-linked-to-public-rce-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-fortinet-fortiweb-hacks-likely-linked-to-public-rce-exploits/</a></p><p><a href="https://www.securityweek.com/oracle-patches-200-vulnerabilities-with-july-2025-cpu/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-200-vulnerabilities-with-july-2025-cpu/</a></p><p><a href="https://www.securityweek.com/trial-opens-against-meta-ceo-mark-zuckerberg-and-other-leaders-over-facebook-privacy-violations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trial-opens-against-meta-ceo-mark-zuckerberg-and-other-leaders-over-facebook-privacy-violations/</a></p><p><a href="https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/</a></p><p><a href="https://www.securityweek.com/cambodia-makes-1000-arrests-in-latest-crackdown-on-cybercrime/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cambodia-makes-1000-arrests-in-latest-crackdown-on-cybercrime/</a></p><p><a href="https://therecord.media/senate-panel-passes-intel-act-salt-typhoon-china" rel="noopener noreferrer" target="_blank">https://therecord.media/senate-panel-passes-intel-act-salt-typhoon-china</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8c634fb2-1848-403f-b37e-d38b55185432</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 17 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8c634fb2-1848-403f-b37e-d38b55185432.mp3" length="29930238" type="audio/mpeg"/><itunes:duration>20:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>946</itunes:episode><podcast:episode>946</podcast:episode></item><item><title>China&apos;s Salt Typhoon HACKED US National Guard for 9 Months, Google AI Discovers Zero-Day Before Hackers, 67 North Korean Malware Packages</title><itunes:title>China&apos;s Salt Typhoon HACKED US National Guard for 9 Months, Google AI Discovers Zero-Day Before Hackers, 67 North Korean Malware Packages</itunes:title><description><![CDATA[<p>🎙️ China's Salt Typhoon HACKED US National Guard for 9 Months, Google AI Discovers Zero-Day Before Hackers, 67 North Korean Malware Packages</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 945: Today's episode will discuss the latest news as China's Salt Typhoon HACKED US National Guard for 9 Months with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome Update Patches Fifth Zero-Day of 2025</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Police Disrupt DiskStation Ransomware Gang Attacking NAS Devices</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response" rel="noopener noreferrer" target="_blank">https://therecord.media/china-typhoon-hackers-nsa-fbi-response</a></p><p><a href="https://www.securityweek.com/chinas-salt-typhoon-hacked-us-national-guard/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-salt-typhoon-hacked-us-national-guard/</a></p><p><a href="https://therecord.media/google-big-sleep-ai-tool-found-bug" rel="noopener noreferrer" target="_blank">https://therecord.media/google-big-sleep-ai-tool-found-bug</a></p><p><a href="https://www.securityweek.com/ddos-attacks-blocked-by-cloudflare-in-2025-already-surpass-2024-total/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ddos-attacks-blocked-by-cloudflare-in-2025-already-surpass-2024-total/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/</a></p><p><a href="https://www.securityweek.com/chrome-update-patches-fifth-zero-day-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-update-patches-fifth-zero-day-of-2025/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/</a></p><p><a href="https://thecyberexpress.com/australia-adopts-ot-cybersecurity-standards/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australia-adopts-ot-cybersecurity-standards/</a></p><p><a href="https://www.securityweek.com/former-us-soldier-who-hacked-att-and-verizon-pleads-guilty/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-us-soldier-who-hacked-att-and-verizon-pleads-guilty/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China's Salt Typhoon HACKED US National Guard for 9 Months, Google AI Discovers Zero-Day Before Hackers, 67 North Korean Malware Packages</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 945: Today's episode will discuss the latest news as China's Salt Typhoon HACKED US National Guard for 9 Months with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome Update Patches Fifth Zero-Day of 2025</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Police Disrupt DiskStation Ransomware Gang Attacking NAS Devices</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response" rel="noopener noreferrer" target="_blank">https://therecord.media/china-typhoon-hackers-nsa-fbi-response</a></p><p><a href="https://www.securityweek.com/chinas-salt-typhoon-hacked-us-national-guard/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-salt-typhoon-hacked-us-national-guard/</a></p><p><a href="https://therecord.media/google-big-sleep-ai-tool-found-bug" rel="noopener noreferrer" target="_blank">https://therecord.media/google-big-sleep-ai-tool-found-bug</a></p><p><a href="https://www.securityweek.com/ddos-attacks-blocked-by-cloudflare-in-2025-already-surpass-2024-total/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ddos-attacks-blocked-by-cloudflare-in-2025-already-surpass-2024-total/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/</a></p><p><a href="https://www.securityweek.com/chrome-update-patches-fifth-zero-day-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-update-patches-fifth-zero-day-of-2025/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/</a></p><p><a href="https://thecyberexpress.com/australia-adopts-ot-cybersecurity-standards/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australia-adopts-ot-cybersecurity-standards/</a></p><p><a href="https://www.securityweek.com/former-us-soldier-who-hacked-att-and-verizon-pleads-guilty/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/former-us-soldier-who-hacked-att-and-verizon-pleads-guilty/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">acf88fdc-3cc9-4fa9-9f51-0e339e029d91</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 16 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/acf88fdc-3cc9-4fa9-9f51-0e339e029d91.mp3" length="26336625" type="audio/mpeg"/><itunes:duration>18:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>945</itunes:episode><podcast:episode>945</podcast:episode></item><item><title>&quot;123456&quot; Password Exposed Chats for 64 Million McDonald&apos;s Job Applications, Railroad Train Vulnerability Could Lead to Derailments, GMX Hacker Returns Stolen Cryptocurrency After $5 Million Bounty Payment</title><itunes:title>&quot;123456&quot; Password Exposed Chats for 64 Million McDonald&apos;s Job Applications, Railroad Train Vulnerability Could Lead to Derailments, GMX Hacker Returns Stolen Cryptocurrency After $5 Million Bounty Payment</itunes:title><description><![CDATA[<p>🎙️ "123456" Password Exposed 64 MILLION McDonald's, 13-Year Train Vulnerability Could DERAIL Trains, GMX Hacker Returns $42M</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 944: Today's episode will discuss the latest news as "123456" Password Exposed 64 MILLION McDonald's with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NVIDIA Shares Guidance to Defend GDDR6 GPUs Against Rowhammer Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Group Claims Attack on Belk Department Store</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Louis Vuitton Data Breach Hits Customers in Several Countries</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nvidia-shares-guidance-to-defend-gddr6-gpus-against-rowhammer-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nvidia-shares-guidance-to-defend-gddr6-gpus-against-rowhammer-attacks/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-belk/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-belk/</a></p><p><a href="https://www.securityweek.com/louis-vuitton-data-breach-hits-customers-in-several-countries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/louis-vuitton-data-breach-hits-customers-in-several-countries/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/123456-password-exposed-chats-for-64-million-mcdonalds-job-chatbot-applications/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/123456-password-exposed-chats-for-64-million-mcdonalds-job-chatbot-applications/</a></p><p><a href="https://therecord.media/hacker-returns-stolen-gmx-bounty" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-returns-stolen-gmx-bounty</a></p><p><a href="https://therecord.media/exploited-file-transfer-bug-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/exploited-file-transfer-bug-cisa</a></p><p><a href="https://www.cybersecuritydive.com/news/railroad-train-vulnerability-derail-brake-cisa-advisory/752940/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/railroad-train-vulnerability-derail-brake-cisa-advisory/752940/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/</a></p><p><a href="https://therecord.media/russia-group-spoofing-journalists-disinfo" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-group-spoofing-journalists-disinfo</a></p><p><a href="https://therecord.media/federal-it-contractor-fined-over-cyber-fraud-allegations" rel="noopener noreferrer" target="_blank">https://therecord.media/federal-it-contractor-fined-over-cyber-fraud-allegations</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ "123456" Password Exposed 64 MILLION McDonald's, 13-Year Train Vulnerability Could DERAIL Trains, GMX Hacker Returns $42M</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 944: Today's episode will discuss the latest news as "123456" Password Exposed 64 MILLION McDonald's with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NVIDIA Shares Guidance to Defend GDDR6 GPUs Against Rowhammer Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Group Claims Attack on Belk Department Store</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Louis Vuitton Data Breach Hits Customers in Several Countries</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nvidia-shares-guidance-to-defend-gddr6-gpus-against-rowhammer-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nvidia-shares-guidance-to-defend-gddr6-gpus-against-rowhammer-attacks/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-belk/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-belk/</a></p><p><a href="https://www.securityweek.com/louis-vuitton-data-breach-hits-customers-in-several-countries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/louis-vuitton-data-breach-hits-customers-in-several-countries/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/123456-password-exposed-chats-for-64-million-mcdonalds-job-chatbot-applications/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/123456-password-exposed-chats-for-64-million-mcdonalds-job-chatbot-applications/</a></p><p><a href="https://therecord.media/hacker-returns-stolen-gmx-bounty" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-returns-stolen-gmx-bounty</a></p><p><a href="https://therecord.media/exploited-file-transfer-bug-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/exploited-file-transfer-bug-cisa</a></p><p><a href="https://www.cybersecuritydive.com/news/railroad-train-vulnerability-derail-brake-cisa-advisory/752940/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/railroad-train-vulnerability-derail-brake-cisa-advisory/752940/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/</a></p><p><a href="https://therecord.media/russia-group-spoofing-journalists-disinfo" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-group-spoofing-journalists-disinfo</a></p><p><a href="https://therecord.media/federal-it-contractor-fined-over-cyber-fraud-allegations" rel="noopener noreferrer" target="_blank">https://therecord.media/federal-it-contractor-fined-over-cyber-fraud-allegations</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">684281a1-59f2-4f51-bbbb-314d4a473566</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 15 Jul 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/684281a1-59f2-4f51-bbbb-314d4a473566.mp3" length="32750836" type="audio/mpeg"/><itunes:duration>22:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>944</itunes:episode><podcast:episode>944</podcast:episode></item><item><title>AI Rubio Hoax Further Exposes Security Gaps, More Than $40 Million Stolen from GMX Crypto Platform, Four Arrested by UK Police Over Ransomware Attacks on M&amp;S, Co-op and Harrods</title><itunes:title>AI Rubio Hoax Further Exposes Security Gaps, More Than $40 Million Stolen from GMX Crypto Platform, Four Arrested by UK Police Over Ransomware Attacks on M&amp;S, Co-op and Harrods</itunes:title><description><![CDATA[<p>🎙️ AI Rubio Hoax EXPOSES Security Gaps, $40M Crypto Exchange HACKED, UK Arrests 4 Ransomware Suspects</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 943: Today's episode will discuss the latest news as AI Rubio Hoax EXPOSES Security Gaps with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ServiceNow Flaw CVE-2025-3648 Could Allow Code Execution</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target US Transportation and Manufacturing Sectors</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/qantas-confirms-data-breach-impacts-57-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qantas-confirms-data-breach-impacts-57-million-customers/</a></p><p><a href="https://therecord.media/gmx-exchange-cryptocurrency-stolen" rel="noopener noreferrer" target="_blank">https://therecord.media/gmx-exchange-cryptocurrency-stolen</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/</a></p><p><a href="https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/</a></p><p><a href="https://www.bankinfosecurity.com/ai-rubio-hoax-further-exposes-white-house-security-gaps-a-28930" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ai-rubio-hoax-further-exposes-white-house-security-gaps-a-28930</a></p><p><a href="https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/</a></p><p><a href="https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html</a></p><p><a href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op</a></p><p><a href="https://www.cybersecuritydive.com/news/iranian-hackers-us-transportation-manufacturing-israel-nozomi/752612/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/iranian-hackers-us-transportation-manufacturing-israel-nozomi/752612/</a></p><p><a href="https://therecord.media/french-intelligence-chief-russia-threat" rel="noopener noreferrer" target="_blank">https://therecord.media/french-intelligence-chief-russia-threat</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub PodcastAI Rubio Hoax Further Exposes Security Gaps, More Than $40 Million Stolen from GMX Crypto Platform, Four Arrested by UK Police Over Ransomware Attacks on M&amp;S, Co-op and Harrods #cybersecurity</p>]]></description><content:encoded><![CDATA[<p>🎙️ AI Rubio Hoax EXPOSES Security Gaps, $40M Crypto Exchange HACKED, UK Arrests 4 Ransomware Suspects</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 943: Today's episode will discuss the latest news as AI Rubio Hoax EXPOSES Security Gaps with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ServiceNow Flaw CVE-2025-3648 Could Allow Code Execution</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target US Transportation and Manufacturing Sectors</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/qantas-confirms-data-breach-impacts-57-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qantas-confirms-data-breach-impacts-57-million-customers/</a></p><p><a href="https://therecord.media/gmx-exchange-cryptocurrency-stolen" rel="noopener noreferrer" target="_blank">https://therecord.media/gmx-exchange-cryptocurrency-stolen</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/</a></p><p><a href="https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/</a></p><p><a href="https://www.bankinfosecurity.com/ai-rubio-hoax-further-exposes-white-house-security-gaps-a-28930" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ai-rubio-hoax-further-exposes-white-house-security-gaps-a-28930</a></p><p><a href="https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/</a></p><p><a href="https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html</a></p><p><a href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op</a></p><p><a href="https://www.cybersecuritydive.com/news/iranian-hackers-us-transportation-manufacturing-israel-nozomi/752612/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/iranian-hackers-us-transportation-manufacturing-israel-nozomi/752612/</a></p><p><a href="https://therecord.media/french-intelligence-chief-russia-threat" rel="noopener noreferrer" target="_blank">https://therecord.media/french-intelligence-chief-russia-threat</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub PodcastAI Rubio Hoax Further Exposes Security Gaps, More Than $40 Million Stolen from GMX Crypto Platform, Four Arrested by UK Police Over Ransomware Attacks on M&amp;S, Co-op and Harrods #cybersecurity</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">652a1ace-e870-45cd-bdb7-2f8245f2cf3f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 10 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/652a1ace-e870-45cd-bdb7-2f8245f2cf3f.mp3" length="25687744" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>943</itunes:episode><podcast:episode>943</podcast:episode></item><item><title>Microsoft July 2025 Patch Tuesday Fixes One Zero-Day and 137 Flaws, M&amp;S Confirms Social Engineering Led to Massive Ransomware Attack, US Sanctions North Korean Hacker Behind IT Worker Scheme</title><itunes:title>Microsoft July 2025 Patch Tuesday Fixes One Zero-Day and 137 Flaws, M&amp;S Confirms Social Engineering Led to Massive Ransomware Attack, US Sanctions North Korean Hacker Behind IT Worker Scheme</itunes:title><description><![CDATA[<p>🎙️ Microsoft Patches 137 Flaws + Zero-Day, M&amp;S Reveals Social Engineering Attack Details, US Sanctions North Korean Hacker</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 942: Today's episode will discuss the latest news as Microsoft Patches 137 Flaws + Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Patches Critical Code Execution Bugs in Multiple Products</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Ransomware Group Pay2Key Targets Israel and US Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Data Leak Reveals Salt Typhoon Contractors' Operations</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-code-execution-bugs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-code-execution-bugs/</a></p><p><a href="https://www.securityweek.com/ivanti-fortinet-splunk-release-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-fortinet-splunk-release-security-updates/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-phoenix-contact-2/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-phoenix-contact-2/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/</a></p><p><a href="https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets</a></p><p><a href="https://www.bankinfosecurity.com/chinese-data-leak-reveals-salt-typhoon-contractors-a-28919" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/chinese-data-leak-reveals-salt-typhoon-contractors-a-28919</a></p><p><a href="https://thehackernews.com/2025/07/us-sanctions-north-korean-andariel.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/us-sanctions-north-korean-andariel.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Microsoft Patches 137 Flaws + Zero-Day, M&amp;S Reveals Social Engineering Attack Details, US Sanctions North Korean Hacker</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 942: Today's episode will discuss the latest news as Microsoft Patches 137 Flaws + Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Patches Critical Code Execution Bugs in Multiple Products</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Ransomware Group Pay2Key Targets Israel and US Organizations</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Data Leak Reveals Salt Typhoon Contractors' Operations</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-critical-code-execution-bugs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-critical-code-execution-bugs/</a></p><p><a href="https://www.securityweek.com/ivanti-fortinet-splunk-release-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-fortinet-splunk-release-security-updates/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-phoenix-contact-2/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-phoenix-contact-2/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/</a></p><p><a href="https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets</a></p><p><a href="https://www.bankinfosecurity.com/chinese-data-leak-reveals-salt-typhoon-contractors-a-28919" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/chinese-data-leak-reveals-salt-typhoon-contractors-a-28919</a></p><p><a href="https://thehackernews.com/2025/07/us-sanctions-north-korean-andariel.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/us-sanctions-north-korean-andariel.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">961395c4-8d0e-4d0a-85c7-efbc9e8cc58e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 09 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/961395c4-8d0e-4d0a-85c7-efbc9e8cc58e.mp3" length="23667747" type="audio/mpeg"/><itunes:duration>16:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>942</itunes:episode><podcast:episode>942</podcast:episode></item><item><title>Employee Gets $920 for Credentials Used in $140 Million Bank Heist, Alleged Chinese Hacker Tied to Silk Typhoon Arrested for Cyberespionage, SEC and SolarWinds Agree to Settle Cyberfraud Lawsuit</title><itunes:title>Employee Gets $920 for Credentials Used in $140 Million Bank Heist, Alleged Chinese Hacker Tied to Silk Typhoon Arrested for Cyberespionage, SEC and SolarWinds Agree to Settle Cyberfraud Lawsuit</itunes:title><description><![CDATA[<p>🎙️ Employee SOLD Credentials for $920 in $140M Bank Heist, Chinese Silk Typhoon Hacker ARRESTED, SolarWinds SEC Settlement</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 941: Today's episode will discuss the latest news as Employee SOLD Credentials for $920 in $140M Bank Heist with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Russia Firmware Company Blamed on Western Hackers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Thousands Impacted by Cyber Incident in Nova Scotia</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploits and Technical Details Released for CitrixBleed2 Vulnerability</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/blogs/sec-solarwinds-agreed-to-settle-cyberfraud-lawsuit-p-3907" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/blogs/sec-solarwinds-agreed-to-settle-cyberfraud-lawsuit-p-3907</a></p><p><a href="https://www.bleepingcomputer.com/news/security/employee-gets-920-for-credentials-used-in-140-million-bank-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/employee-gets-920-for-credentials-used-in-140-million-bank-heist/</a></p><p><a href="https://therecord.media/cyberattack-russia-firmware-blow-hackers" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-russia-firmware-blow-hackers</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qantas-is-being-extorted-in-recent-data-theft-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qantas-is-being-extorted-in-recent-data-theft-cyberattack/</a></p><p><a href="https://therecord.media/thousands-impacted-cyber-nova-scotia" rel="noopener noreferrer" target="_blank">https://therecord.media/thousands-impacted-cyber-nova-scotia</a></p><p><a href="https://www.securityweek.com/exploits-technical-details-released-for-citrixbleed2-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploits-technical-details-released-for-citrixbleed2-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/alleged-chinese-hacker-tied-to-silk-typhoon-arrested-for-cyberespionage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/alleged-chinese-hacker-tied-to-silk-typhoon-arrested-for-cyberespionage/</a></p><p><a href="https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Employee SOLD Credentials for $920 in $140M Bank Heist, Chinese Silk Typhoon Hacker ARRESTED, SolarWinds SEC Settlement</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 941: Today's episode will discuss the latest news as Employee SOLD Credentials for $920 in $140M Bank Heist with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyberattack on Russia Firmware Company Blamed on Western Hackers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Thousands Impacted by Cyber Incident in Nova Scotia</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploits and Technical Details Released for CitrixBleed2 Vulnerability</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/blogs/sec-solarwinds-agreed-to-settle-cyberfraud-lawsuit-p-3907" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/blogs/sec-solarwinds-agreed-to-settle-cyberfraud-lawsuit-p-3907</a></p><p><a href="https://www.bleepingcomputer.com/news/security/employee-gets-920-for-credentials-used-in-140-million-bank-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/employee-gets-920-for-credentials-used-in-140-million-bank-heist/</a></p><p><a href="https://therecord.media/cyberattack-russia-firmware-blow-hackers" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-russia-firmware-blow-hackers</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qantas-is-being-extorted-in-recent-data-theft-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qantas-is-being-extorted-in-recent-data-theft-cyberattack/</a></p><p><a href="https://therecord.media/thousands-impacted-cyber-nova-scotia" rel="noopener noreferrer" target="_blank">https://therecord.media/thousands-impacted-cyber-nova-scotia</a></p><p><a href="https://www.securityweek.com/exploits-technical-details-released-for-citrixbleed2-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploits-technical-details-released-for-citrixbleed2-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/alleged-chinese-hacker-tied-to-silk-typhoon-arrested-for-cyberespionage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/alleged-chinese-hacker-tied-to-silk-typhoon-arrested-for-cyberespionage/</a></p><p><a href="https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1c87fb6c-9348-4e9b-86da-10be060b7b1f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 08 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1c87fb6c-9348-4e9b-86da-10be060b7b1f.mp3" length="23047704" type="audio/mpeg"/><itunes:duration>16:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>941</itunes:episode><podcast:episode>941</podcast:episode></item><item><title>Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker</title><itunes:title>Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker</itunes:title><description><![CDATA[<p>🎙️ Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 940: Today's episode will discuss the latest news as Ingram Micro HIT by SafePay Ransomware with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Virginia County Says Ransomware Attack Exposed Employee SSNs</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NightEagle APT Exploits Microsoft Outlook Zero-Day Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TAG-140 Deploys DRAT v2 RAT Targeting Asian Countries</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/</a></p><p><a href="https://therecord.media/twonet-it-army-of-russia-new-hacktivist-groups-target-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/twonet-it-army-of-russia-new-hacktivist-groups-target-ukraine</a></p><p><a href="https://therecord.media/virginia-county-says-ransomware-attack-exposed-ssns" rel="noopener noreferrer" target="_blank">https://therecord.media/virginia-county-says-ransomware-attack-exposed-ssns</a></p><p><a href="https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html</a></p><p><a href="https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html</a></p><p><a href="https://therecord.media/interpol-west-africa-cybercrime-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/interpol-west-africa-cybercrime-compounds</a></p><p><a href="https://www.securityweek.com/police-in-brazil-arrest-a-suspect-over-100m-banking-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/police-in-brazil-arrest-a-suspect-over-100m-banking-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/grafana-releases-critical-security-update-for-image-renderer-plugin/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/grafana-releases-critical-security-update-for-image-renderer-plugin/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 940: Today's episode will discuss the latest news as Ingram Micro HIT by SafePay Ransomware with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Virginia County Says Ransomware Attack Exposed Employee SSNs</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NightEagle APT Exploits Microsoft Outlook Zero-Day Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TAG-140 Deploys DRAT v2 RAT Targeting Asian Countries</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/</a></p><p><a href="https://therecord.media/twonet-it-army-of-russia-new-hacktivist-groups-target-ukraine" rel="noopener noreferrer" target="_blank">https://therecord.media/twonet-it-army-of-russia-new-hacktivist-groups-target-ukraine</a></p><p><a href="https://therecord.media/virginia-county-says-ransomware-attack-exposed-ssns" rel="noopener noreferrer" target="_blank">https://therecord.media/virginia-county-says-ransomware-attack-exposed-ssns</a></p><p><a href="https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html</a></p><p><a href="https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html</a></p><p><a href="https://therecord.media/interpol-west-africa-cybercrime-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/interpol-west-africa-cybercrime-compounds</a></p><p><a href="https://www.securityweek.com/police-in-brazil-arrest-a-suspect-over-100m-banking-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/police-in-brazil-arrest-a-suspect-over-100m-banking-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/grafana-releases-critical-security-update-for-image-renderer-plugin/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/grafana-releases-critical-security-update-for-image-renderer-plugin/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2bf123d4-f1e4-4789-a601-515e94f7c015</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 07 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2bf123d4-f1e4-4789-a601-515e94f7c015.mp3" length="23444557" type="audio/mpeg"/><itunes:duration>16:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>940</itunes:episode><podcast:episode>940</podcast:episode></item><item><title>Qantas Data Breach Impacts 6 Million Customers, DOJ Investigates Ex-Ransomware Negotiator Over Extortion Kickbacks, Columbia Hacker Steals Data for Political Agenda</title><itunes:title>Qantas Data Breach Impacts 6 Million Customers, DOJ Investigates Ex-Ransomware Negotiator Over Extortion Kickbacks, Columbia Hacker Steals Data for Political Agenda</itunes:title><description><![CDATA[<p>🎙️ Qantas 6M Records STOLEN, DOJ Probes Ransomware Negotiator CORRUPTION, Columbia Hacker's Political Agenda</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 939: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DOJ Investigates Ex-Ransomware Negotiator Over Extortion Kickbacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Columbia Hacker with Political Agenda Steals Student Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Hackers Use Fake Zoom Updates for macOS Malware</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/qantas-airline-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/qantas-airline-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/</a></p><p><a href="https://therecord.media/hacker-political-agenda-columbia-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-political-agenda-columbia-cyberattack</a></p><p><a href="https://www.securityweek.com/north-korean-hackers-use-fake-zoom-updates-to-install-macos-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-use-fake-zoom-updates-to-install-macos-malware/</a></p><p><a href="https://www.securityweek.com/cisco-warns-of-hardcoded-credentials-in-enterprise-software/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-warns-of-hardcoded-credentials-in-enterprise-software/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/</a></p><p><a href="https://therecord.media/google-lawsuit-data-collection-android-cellular" rel="noopener noreferrer" target="_blank">https://therecord.media/google-lawsuit-data-collection-android-cellular</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-41-deals-announced-in-june-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-41-deals-announced-in-june-2025/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Qantas 6M Records STOLEN, DOJ Probes Ransomware Negotiator CORRUPTION, Columbia Hacker's Political Agenda</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 939: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DOJ Investigates Ex-Ransomware Negotiator Over Extortion Kickbacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Columbia Hacker with Political Agenda Steals Student Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Hackers Use Fake Zoom Updates for macOS Malware</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/qantas-airline-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/qantas-airline-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/</a></p><p><a href="https://therecord.media/hacker-political-agenda-columbia-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-political-agenda-columbia-cyberattack</a></p><p><a href="https://www.securityweek.com/north-korean-hackers-use-fake-zoom-updates-to-install-macos-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-hackers-use-fake-zoom-updates-to-install-macos-malware/</a></p><p><a href="https://www.securityweek.com/cisco-warns-of-hardcoded-credentials-in-enterprise-software/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-warns-of-hardcoded-credentials-in-enterprise-software/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/</a></p><p><a href="https://therecord.media/google-lawsuit-data-collection-android-cellular" rel="noopener noreferrer" target="_blank">https://therecord.media/google-lawsuit-data-collection-android-cellular</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-41-deals-announced-in-june-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-41-deals-announced-in-june-2025/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a986159f-414f-4342-bfd8-4deccdd95165</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 03 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a986159f-414f-4342-bfd8-4deccdd95165.mp3" length="24289670" type="audio/mpeg"/><itunes:duration>16:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>939</itunes:episode><podcast:episode>939</podcast:episode></item><item><title>Qantas Data Breach Impacts 6 Million Customers, French Government Agencies Hit by Chinese Ivanti Exploits, Critical Anthropic AI Vulnerability Exposes Developer Machines 🚨</title><itunes:title>Qantas Data Breach Impacts 6 Million Customers, French Government Agencies Hit by Chinese Ivanti Exploits, Critical Anthropic AI Vulnerability Exposes Developer Machines 🚨</itunes:title><description><![CDATA[<p>🎙️ Qantas 6 MILLION Customer Records STOLEN, France Gov Hit by Chinese Hackers, Critical Anthropic AI Flaw</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 938: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;French Government Agencies Hit by Chinese Ivanti Zero-Day Exploits</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Anthropic AI Vulnerability Exposes Developer Machines to RCE</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Media Cyberattack Linked to Sanctioned Institute</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited" rel="noopener noreferrer" target="_blank">https://therecord.media/france-anssi-report-ivanti-bugs-exploited</a></p><p><a href="https://www.securityweek.com/qantas-data-breach-impacts-up-to-6-million-customers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/qantas-data-breach-impacts-up-to-6-million-customers/</a></p><p><a href="https://therecord.media/cyberattack-on-russian-media-linked-to-sanctioned-institute" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-on-russian-media-linked-to-sanctioned-institute</a></p><p><a href="https://www.bleepingcomputer.com/news/security/atandt-rolls-out-wireless-lock-feature-to-block-sim-swap-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/atandt-rolls-out-wireless-lock-feature-to-block-sim-swap-attacks/</a></p><p><a href="https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-two-exploited-telemessage-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-two-exploited-telemessage-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/senate-strips-ai-moratorium-amid-sharp-bipartisan-opposition-a-28876" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/senate-strips-ai-moratorium-amid-sharp-bipartisan-opposition-a-28876</a></p><p><a href="https://industrialcyber.co/nerc-cip/ferc-ends-rulemaking-on-a-cip-reliability-standard-seeks-input-on-coordinated-cyberattack-risks/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/nerc-cip/ferc-ends-rulemaking-on-a-cip-reliability-standard-seeks-input-on-coordinated-cyberattack-risks/</a></p><p><a href="https://therecord.media/trump-national-cyber-director-pick-clears-senate-panel" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-national-cyber-director-pick-clears-senate-panel</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Qantas 6 MILLION Customer Records STOLEN, France Gov Hit by Chinese Hackers, Critical Anthropic AI Flaw</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Ep – 938: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;French Government Agencies Hit by Chinese Ivanti Zero-Day Exploits</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Anthropic AI Vulnerability Exposes Developer Machines to RCE</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Media Cyberattack Linked to Sanctioned Institute</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited" rel="noopener noreferrer" target="_blank">https://therecord.media/france-anssi-report-ivanti-bugs-exploited</a></p><p><a href="https://www.securityweek.com/qantas-data-breach-impacts-up-to-6-million-customers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/qantas-data-breach-impacts-up-to-6-million-customers/</a></p><p><a href="https://therecord.media/cyberattack-on-russian-media-linked-to-sanctioned-institute" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-on-russian-media-linked-to-sanctioned-institute</a></p><p><a href="https://www.bleepingcomputer.com/news/security/atandt-rolls-out-wireless-lock-feature-to-block-sim-swap-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/atandt-rolls-out-wireless-lock-feature-to-block-sim-swap-attacks/</a></p><p><a href="https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-two-exploited-telemessage-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-two-exploited-telemessage-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/senate-strips-ai-moratorium-amid-sharp-bipartisan-opposition-a-28876" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/senate-strips-ai-moratorium-amid-sharp-bipartisan-opposition-a-28876</a></p><p><a href="https://industrialcyber.co/nerc-cip/ferc-ends-rulemaking-on-a-cip-reliability-standard-seeks-input-on-coordinated-cyberattack-risks/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/nerc-cip/ferc-ends-rulemaking-on-a-cip-reliability-standard-seeks-input-on-coordinated-cyberattack-risks/</a></p><p><a href="https://therecord.media/trump-national-cyber-director-pick-clears-senate-panel" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-national-cyber-director-pick-clears-senate-panel</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7715bf51-aa78-421f-a8f0-614d6ac2ede9</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 02 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/7715bf51-aa78-421f-a8f0-614d6ac2ede9.mp3" length="24201272" type="audio/mpeg"/><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>938</itunes:episode><podcast:episode>938</podcast:episode></item><item><title>🎙️ Hawaiian Airlines Hacked by Scattered Spider Aviation Campaign, Ahold Delhaize Breach Impacts 2.2 million People, Over 1,200 Citrix Servers Unpatched</title><itunes:title>🎙️ Hawaiian Airlines Hacked by Scattered Spider Aviation Campaign, Ahold Delhaize Breach Impacts 2.2 million People, Over 1,200 Citrix Servers Unpatched</itunes:title><description><![CDATA[<p>🎙️ Scattered Spider STRIKES Airlines, 2.2M Records STOLEN, 1,200+ Citrix Servers UNPATCHED</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Ep – 936: Today’s episode will discuss the latest news as Scattered Spider STRIKES Hawaiian Airlines and more other headlines: </p><p>• Canada Gives Hikvision the Boot on National Security Grounds </p><p>• NATO Agreement Calls for 5% GDP Defense Spending Including Cyber </p><p>• Germany Orders Apple, Google to Remove DeepSeek App</p><p><br></p><p>For more information, please visit our website:  https://www.cyberhubpodcast.com/ </p><p><br></p><p>✅ Story Links: </p><p>https://www.securityweek.com/hawaiian-airlines-hacked-as-aviation-sector-warned-of-scattered-spider-attacks/</p><p>https://therecord.media/united-natural-foods-cyber-incident-q4-impact</p><p>https://www.securityweek.com/ahold-delhaize-data-breach-impacts-2-2-million-people/</p><p>https://www.securityweek.com/canada-gives-hikvision-the-boot-on-national-security-grounds/</p><p>https://zamin.uz/en/world/153439-germany-and-israel-have-launched-a-new-strategic-direction-in-cybersecurity.html</p><p>https://www.bankinfosecurity.com/berlin-regulator-orders-apple-google-to-remove-deepseek-a-28851</p><p>https://therecord.media/nato-agreement-5percent-gdp-defense-spending-cyber</p><p>https://www.bleepingcomputer.com/news/security/over-1-200-citrix-servers-unpatched-against-critical-auth-bypass-flaw/</p><p>https://www.bleepingcomputer.com/news/technology/russias-throttling-of-cloudflare-makes-sites-inaccessible/</p><p>https://www.securityweek.com/casie-antalis-named-executive-director-of-cisa/</p><p>https://www.securityweek.com/patrick-ware-named-executive-director-of-us-cyber-command/</p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  </p><p><br></p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast   </p><p><br></p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p><br></p><p>🤝 For Business Inquiries:  info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p>https://youtu.be/Q9Hp5beyF18</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p>https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p> =============================</p><p>🚀 About The CyberHub Podcast.</p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p> </p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:  info@cyberhubpodcast.com </p><p><br></p><p>=================================</p><p><br></p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews </p><p><br></p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p><br></p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p><br></p><p>© The CyberHub Podcast</p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Scattered Spider STRIKES Airlines, 2.2M Records STOLEN, 1,200+ Citrix Servers UNPATCHED</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Ep – 936: Today’s episode will discuss the latest news as Scattered Spider STRIKES Hawaiian Airlines and more other headlines: </p><p>• Canada Gives Hikvision the Boot on National Security Grounds </p><p>• NATO Agreement Calls for 5% GDP Defense Spending Including Cyber </p><p>• Germany Orders Apple, Google to Remove DeepSeek App</p><p><br></p><p>For more information, please visit our website:  https://www.cyberhubpodcast.com/ </p><p><br></p><p>✅ Story Links: </p><p>https://www.securityweek.com/hawaiian-airlines-hacked-as-aviation-sector-warned-of-scattered-spider-attacks/</p><p>https://therecord.media/united-natural-foods-cyber-incident-q4-impact</p><p>https://www.securityweek.com/ahold-delhaize-data-breach-impacts-2-2-million-people/</p><p>https://www.securityweek.com/canada-gives-hikvision-the-boot-on-national-security-grounds/</p><p>https://zamin.uz/en/world/153439-germany-and-israel-have-launched-a-new-strategic-direction-in-cybersecurity.html</p><p>https://www.bankinfosecurity.com/berlin-regulator-orders-apple-google-to-remove-deepseek-a-28851</p><p>https://therecord.media/nato-agreement-5percent-gdp-defense-spending-cyber</p><p>https://www.bleepingcomputer.com/news/security/over-1-200-citrix-servers-unpatched-against-critical-auth-bypass-flaw/</p><p>https://www.bleepingcomputer.com/news/technology/russias-throttling-of-cloudflare-makes-sites-inaccessible/</p><p>https://www.securityweek.com/casie-antalis-named-executive-director-of-cisa/</p><p>https://www.securityweek.com/patrick-ware-named-executive-director-of-us-cyber-command/</p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  </p><p><br></p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast   </p><p><br></p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p><br></p><p>🤝 For Business Inquiries:  info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p>https://youtu.be/Q9Hp5beyF18</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p>https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p> =============================</p><p>🚀 About The CyberHub Podcast.</p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p> </p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:  info@cyberhubpodcast.com </p><p><br></p><p>=================================</p><p><br></p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews </p><p><br></p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p><br></p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p><br></p><p>© The CyberHub Podcast</p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">58ab6774-c23c-4342-9167-2239f6baa2b0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 01 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/58ab6774-c23c-4342-9167-2239f6baa2b0.mp3" length="24389353" type="audio/mpeg"/><itunes:duration>16:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>937</itunes:episode><podcast:episode>937</podcast:episode></item><item><title>DOJ Raids 29 North Korean Laptop Farms Across 16 States, Switzerland Government Data Stolen in Ransomware Attack, Europol Disrupts $540 Million Crypto Fraud Ring</title><itunes:title>DOJ Raids 29 North Korean Laptop Farms Across 16 States, Switzerland Government Data Stolen in Ransomware Attack, Europol Disrupts $540 Million Crypto Fraud Ring</itunes:title><description><![CDATA[<p>🎙️ DOJ RAIDS 29 North Korean Laptop Farms, Switzerland Government HACKED, $540M Crypto Scam BUSTED</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 937: Today’s episode will discuss the latest news as DOJ RAIDS 29 North Korean Laptop Farms and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;International Criminal Court Targeted by Sophisticated Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Johnson Controls Notifies People Affected by 2023 Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target Industrial Control Systems Amid US Warning</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-raids-laptop-farms-crackdown" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-raids-laptop-farms-crackdown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/switzerland-says-government-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/switzerland-says-government-data-stolen-in-ransomware-attack/</a></p><p><a href="https://www.fdd.org/analysis/2025/06/30/an-urgent-call-to-close-the-loopholes-on-chips-and-china/" rel="noopener noreferrer" target="_blank">https://www.fdd.org/analysis/2025/06/30/an-urgent-call-to-close-the-loopholes-on-chips-and-china/</a></p><p><a href="https://therecord.media/international-criminal-court-cyberattack-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/international-criminal-court-cyberattack-2025</a></p><p><a href="https://www.securityweek.com/iranian-hackers-preferred-ics-targets-left-open-amid-fresh-us-attack-warning/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-preferred-ics-targets-left-open-amid-fresh-us-attack-warning/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/europol-helps-disrupt-540-million-crypto-investment-fraud-ring/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/europol-helps-disrupt-540-million-crypto-investment-fraud-ring/</a></p><p><a href="https://www.securityweek.com/cloudflare-puts-a-default-block-on-ai-web-scraping/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-puts-a-default-block-on-ai-web-scraping/</a></p><p><a href="https://www.securityweek.com/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero/</a></p><p><a href="https://www.securityweek.com/chrome-138-update-patches-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-138-update-patches-zero-day-vulnerability/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ DOJ RAIDS 29 North Korean Laptop Farms, Switzerland Government HACKED, $540M Crypto Scam BUSTED</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 937: Today’s episode will discuss the latest news as DOJ RAIDS 29 North Korean Laptop Farms and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;International Criminal Court Targeted by Sophisticated Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Johnson Controls Notifies People Affected by 2023 Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iranian Hackers Target Industrial Control Systems Amid US Warning</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-raids-laptop-farms-crackdown" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-raids-laptop-farms-crackdown</a></p><p><a href="https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/switzerland-says-government-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/switzerland-says-government-data-stolen-in-ransomware-attack/</a></p><p><a href="https://www.fdd.org/analysis/2025/06/30/an-urgent-call-to-close-the-loopholes-on-chips-and-china/" rel="noopener noreferrer" target="_blank">https://www.fdd.org/analysis/2025/06/30/an-urgent-call-to-close-the-loopholes-on-chips-and-china/</a></p><p><a href="https://therecord.media/international-criminal-court-cyberattack-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/international-criminal-court-cyberattack-2025</a></p><p><a href="https://www.securityweek.com/iranian-hackers-preferred-ics-targets-left-open-amid-fresh-us-attack-warning/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-preferred-ics-targets-left-open-amid-fresh-us-attack-warning/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/europol-helps-disrupt-540-million-crypto-investment-fraud-ring/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/europol-helps-disrupt-540-million-crypto-investment-fraud-ring/</a></p><p><a href="https://www.securityweek.com/cloudflare-puts-a-default-block-on-ai-web-scraping/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cloudflare-puts-a-default-block-on-ai-web-scraping/</a></p><p><a href="https://www.securityweek.com/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero/</a></p><p><a href="https://www.securityweek.com/chrome-138-update-patches-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-138-update-patches-zero-day-vulnerability/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0f95ba93-2aba-4aa1-a41e-0b583ecf0819</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 01 Jul 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0f95ba93-2aba-4aa1-a41e-0b583ecf0819.mp3" length="24389353" type="audio/mpeg"/><itunes:duration>16:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>936</itunes:episode><podcast:episode>936</podcast:episode></item><item><title>CitrixBleed 2 NIGHTMARE Returns, British Hacker &quot;IntelBroker&quot; CHARGED, Iran Uses AI for Cyber Warfare</title><itunes:title>CitrixBleed 2 NIGHTMARE Returns, British Hacker &quot;IntelBroker&quot; CHARGED, Iran Uses AI for Cyber Warfare</itunes:title><description><![CDATA[<p>🎙️ CitrixBleed 2 NIGHTMARE Returns, British Hacker "IntelBroker" CHARGED, Iran Uses AI for Cyber Warfare</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 935: Today’s episode will discuss the latest news as CitrixBleed 2 NIGHTMARE Returns and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns AMI BMC Vulnerability Being Exploited</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Abuse ConnectWise to Hide Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Judge Approves AT&amp;T $177 Million Settlement for Data Breach&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/</a></p><p><a href="https://therecord.media/british-hacker-intelbroker-spree-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/british-hacker-intelbroker-spree-breaches</a></p><p><a href="https://thehackernews.com/2025/06/iranian-apt35-hackers-targeting-israeli.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/iranian-apt35-hackers-targeting-israeli.html</a></p><p><a href="https://therecord.media/columbia-university-technology-outages" rel="noopener noreferrer" target="_blank">https://therecord.media/columbia-university-technology-outages</a></p><p><a href="https://www.securityweek.com/hackers-abuse-connectwise-to-hide-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-abuse-connectwise-to-hide-malware/</a></p><p><a href="https://www.securityweek.com/cisa-warns-ami-bmc-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-ami-bmc-vulnerability-exploited-in-the-wild/</a></p><p><a href="https://federalnewsnetwork.com/defense-news/2025/06/dod-issues-first-rfi-to-overhaul-risk-management-framework/" rel="noopener noreferrer" target="_blank">https://federalnewsnetwork.com/defense-news/2025/06/dod-issues-first-rfi-to-overhaul-risk-management-framework/</a></p><p><a href="https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/</a></p><p><a href="https://thequantuminsider.com/2025/06/26/u-s-lawmakers-urge-urgent-action-on-cybersecurity-in-face-of-quantum-threat/" rel="noopener noreferrer" target="_blank">https://thequantuminsider.com/2025/06/26/u-s-lawmakers-urge-urgent-action-on-cybersecurity-in-face-of-quantum-threat/</a></p><p><a href="https://www.cybersecuritydive.com/news/judge-att-177m-settlement-data-breach/751486/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/judge-att-177m-settlement-data-breach/751486/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ CitrixBleed 2 NIGHTMARE Returns, British Hacker "IntelBroker" CHARGED, Iran Uses AI for Cyber Warfare</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 935: Today’s episode will discuss the latest news as CitrixBleed 2 NIGHTMARE Returns and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns AMI BMC Vulnerability Being Exploited</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Abuse ConnectWise to Hide Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Judge Approves AT&amp;T $177 Million Settlement for Data Breach&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/</a></p><p><a href="https://therecord.media/british-hacker-intelbroker-spree-breaches" rel="noopener noreferrer" target="_blank">https://therecord.media/british-hacker-intelbroker-spree-breaches</a></p><p><a href="https://thehackernews.com/2025/06/iranian-apt35-hackers-targeting-israeli.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/iranian-apt35-hackers-targeting-israeli.html</a></p><p><a href="https://therecord.media/columbia-university-technology-outages" rel="noopener noreferrer" target="_blank">https://therecord.media/columbia-university-technology-outages</a></p><p><a href="https://www.securityweek.com/hackers-abuse-connectwise-to-hide-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-abuse-connectwise-to-hide-malware/</a></p><p><a href="https://www.securityweek.com/cisa-warns-ami-bmc-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-ami-bmc-vulnerability-exploited-in-the-wild/</a></p><p><a href="https://federalnewsnetwork.com/defense-news/2025/06/dod-issues-first-rfi-to-overhaul-risk-management-framework/" rel="noopener noreferrer" target="_blank">https://federalnewsnetwork.com/defense-news/2025/06/dod-issues-first-rfi-to-overhaul-risk-management-framework/</a></p><p><a href="https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/</a></p><p><a href="https://thequantuminsider.com/2025/06/26/u-s-lawmakers-urge-urgent-action-on-cybersecurity-in-face-of-quantum-threat/" rel="noopener noreferrer" target="_blank">https://thequantuminsider.com/2025/06/26/u-s-lawmakers-urge-urgent-action-on-cybersecurity-in-face-of-quantum-threat/</a></p><p><a href="https://www.cybersecuritydive.com/news/judge-att-177m-settlement-data-breach/751486/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/judge-att-177m-settlement-data-breach/751486/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">241983c7-d389-4135-895c-3ccedfb78523</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 26 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/241983c7-d389-4135-895c-3ccedfb78523.mp3" length="26638183" type="audio/mpeg"/><itunes:duration>18:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>935</itunes:episode><podcast:episode>935</podcast:episode></item><item><title>🎙️ FBI Warns China Typhoon Groups Still Active, Iran Exploits Israeli Security Cameras for Missile Strikes, North Korea Supply Chain Attack Hits Developers</title><itunes:title>🎙️ FBI Warns China Typhoon Groups Still Active, Iran Exploits Israeli Security Cameras for Missile Strikes, North Korea Supply Chain Attack Hits Developers</itunes:title><description><![CDATA[<p>🎙️ FBI Warns China Typhoon Groups Still Active, Iran Exploits Israeli Security Cameras for Missile Strikes, North Korea Supply Chain Attack Hits Developers</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 934: Today’s episode will discuss the latest news as BI Warns China Typhoon Groups Still Active and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Hit by DDoS Attacks from Iranian Hacktivists</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Insurance Premiums Decline According to AM Best Report</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Enterprise Server Patches Critical Code Execution Vulnerability&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/china-typhoon-groups-espionage-fbi-cyber-brett-leatherman" rel="noopener noreferrer" target="_blank">https://therecord.media/china-typhoon-groups-espionage-fbi-cyber-brett-leatherman</a></p><p><a href="https://therecord.media/iran-espionage-israeli-security-cameras-missile-attacks" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-espionage-israeli-security-cameras-missile-attacks</a></p><p><a href="https://thecyberexpress.com/us-ddos-attacks-iran-hacktivists/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-ddos-attacks-iran-hacktivists/</a></p><p><a href="https://thehackernews.com/2025/06/pro-iranian-hacktivist-group-leaks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/pro-iranian-hacktivist-group-leaks.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/</a></p><p><a href="https://thehackernews.com/2025/06/north-korea-linked-supply-chain-attack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/north-korea-linked-supply-chain-attack.html</a></p><p><a href="https://www.securityweek.com/code-execution-vulnerability-patched-in-github-enterprise-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-vulnerability-patched-in-github-enterprise-server/</a></p><p><a href="https://www.securityweek.com/siemens-notifies-customers-of-microsoft-defender-antivirus-issue/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/siemens-notifies-customers-of-microsoft-defender-antivirus-issue/</a></p><p><a href="https://www.securityweek.com/sonicwall-warns-of-trojanized-netextender-stealing-user-information/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-warns-of-trojanized-netextender-stealing-user-information/</a></p><p><a href="https://www.securityweek.com/chrome-138-firefox-140-patch-multiple-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-138-firefox-140-patch-multiple-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI Warns China Typhoon Groups Still Active, Iran Exploits Israeli Security Cameras for Missile Strikes, North Korea Supply Chain Attack Hits Developers</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 934: Today’s episode will discuss the latest news as BI Warns China Typhoon Groups Still Active and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Hit by DDoS Attacks from Iranian Hacktivists</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Insurance Premiums Decline According to AM Best Report</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Enterprise Server Patches Critical Code Execution Vulnerability&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/china-typhoon-groups-espionage-fbi-cyber-brett-leatherman" rel="noopener noreferrer" target="_blank">https://therecord.media/china-typhoon-groups-espionage-fbi-cyber-brett-leatherman</a></p><p><a href="https://therecord.media/iran-espionage-israeli-security-cameras-missile-attacks" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-espionage-israeli-security-cameras-missile-attacks</a></p><p><a href="https://thecyberexpress.com/us-ddos-attacks-iran-hacktivists/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-ddos-attacks-iran-hacktivists/</a></p><p><a href="https://thehackernews.com/2025/06/pro-iranian-hacktivist-group-leaks.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/pro-iranian-hacktivist-group-leaks.html</a></p><p><a href="https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/</a></p><p><a href="https://thehackernews.com/2025/06/north-korea-linked-supply-chain-attack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/north-korea-linked-supply-chain-attack.html</a></p><p><a href="https://www.securityweek.com/code-execution-vulnerability-patched-in-github-enterprise-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-vulnerability-patched-in-github-enterprise-server/</a></p><p><a href="https://www.securityweek.com/siemens-notifies-customers-of-microsoft-defender-antivirus-issue/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/siemens-notifies-customers-of-microsoft-defender-antivirus-issue/</a></p><p><a href="https://www.securityweek.com/sonicwall-warns-of-trojanized-netextender-stealing-user-information/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-warns-of-trojanized-netextender-stealing-user-information/</a></p><p><a href="https://www.securityweek.com/chrome-138-firefox-140-patch-multiple-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-138-firefox-140-patch-multiple-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">24568018-791a-45eb-aba4-5890df880a5e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 25 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/24568018-791a-45eb-aba4-5890df880a5e.mp3" length="26101523" type="audio/mpeg"/><itunes:duration>18:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>934</itunes:episode><podcast:episode>934</podcast:episode></item><item><title>740K Patient Records STOLEN, Salt Typhoon DESTROYS Canadian Telecom, NATO Summit SABOTAGED</title><itunes:title>740K Patient Records STOLEN, Salt Typhoon DESTROYS Canadian Telecom, NATO Summit SABOTAGED</itunes:title><description><![CDATA[<p>🎙️ 740K Patient Records STOLEN, Salt Typhoon DESTROYS Canadian Telecom, NATO Summit SABOTAGED</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 933: Today’s episode will discuss the latest news as 740K Patient Records STOLEN and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US House Bans WhatsApp on Official Devices Over Security Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese APT Hacking Routers to Build Espionage Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Echo Chamber Jailbreak Bypasses AI Guardrails with Ease&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/mclaren-health-care-data-breach-notification-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/mclaren-health-care-data-breach-notification-ransomware</a></p><p><a href="https://thehackernews.com/2025/06/china-linked-salt-typhoon-exploits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/china-linked-salt-typhoon-exploits.html</a></p><p><a href="https://www.securityweek.com/chinese-apt-hacking-routers-to-build-espionage-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-apt-hacking-routers-to-build-espionage-infrastructure/</a></p><p><a href="https://therecord.media/nato-summit-the-hague-rail-cables-set-on-fire" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-summit-the-hague-rail-cables-set-on-fire</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-homeland-security-warns-of-escalating-iranian-cyberattack-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-homeland-security-warns-of-escalating-iranian-cyberattack-risks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/</a></p><p><a href="https://www.securityweek.com/new-echo-chamber-jailbreak-bypasses-ai-guardrails-with-ease/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-echo-chamber-jailbreak-bypasses-ai-guardrails-with-ease/</a></p><p><a href="https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/</a></p><p><a href="https://www.cybersecuritydive.com/news/cloud-security-amazon-google-microsoft-tenable-report/751047/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cloud-security-amazon-google-microsoft-tenable-report/751047/</a></p><p><a href="https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 740K Patient Records STOLEN, Salt Typhoon DESTROYS Canadian Telecom, NATO Summit SABOTAGED</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 933: Today’s episode will discuss the latest news as 740K Patient Records STOLEN and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US House Bans WhatsApp on Official Devices Over Security Concerns</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese APT Hacking Routers to Build Espionage Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Echo Chamber Jailbreak Bypasses AI Guardrails with Ease&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/mclaren-health-care-data-breach-notification-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/mclaren-health-care-data-breach-notification-ransomware</a></p><p><a href="https://thehackernews.com/2025/06/china-linked-salt-typhoon-exploits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/china-linked-salt-typhoon-exploits.html</a></p><p><a href="https://www.securityweek.com/chinese-apt-hacking-routers-to-build-espionage-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-apt-hacking-routers-to-build-espionage-infrastructure/</a></p><p><a href="https://therecord.media/nato-summit-the-hague-rail-cables-set-on-fire" rel="noopener noreferrer" target="_blank">https://therecord.media/nato-summit-the-hague-rail-cables-set-on-fire</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-homeland-security-warns-of-escalating-iranian-cyberattack-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-homeland-security-warns-of-escalating-iranian-cyberattack-risks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/</a></p><p><a href="https://www.securityweek.com/new-echo-chamber-jailbreak-bypasses-ai-guardrails-with-ease/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-echo-chamber-jailbreak-bypasses-ai-guardrails-with-ease/</a></p><p><a href="https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/</a></p><p><a href="https://www.cybersecuritydive.com/news/cloud-security-amazon-google-microsoft-tenable-report/751047/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cloud-security-amazon-google-microsoft-tenable-report/751047/</a></p><p><a href="https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1b4ce38a-6c81-49f9-b573-1220c3637b02</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 24 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1b4ce38a-6c81-49f9-b573-1220c3637b02.mp3" length="26001213" type="audio/mpeg"/><itunes:duration>18:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>933</itunes:episode><podcast:episode>933</podcast:episode></item><item><title>Insurance Industry Under Attack, $225 Million Crypto Recovery, US-Israel-Iran Cyber Tensions Escalates, China Targets Russian Assets</title><itunes:title>Insurance Industry Under Attack, $225 Million Crypto Recovery, US-Israel-Iran Cyber Tensions Escalates, China Targets Russian Assets</itunes:title><description><![CDATA[<p>🎙️ Scattered Spider DESTROYS Insurance Industry | $225M Crypto Seizure | China vs Russia Cyber War</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 932: Today’s episode will discuss the latest news as Scattered Spider DESTROYS Insurance Industry and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel vs Iran Escalates</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Dairy Supply Disruption</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Freetype Zeroday exploited in Spyware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/aflac-cyberattack-potential-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/aflac-cyberattack-potential-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/</a></p><p><a href="https://therecord.media/russia-dairy-supply-disrupted-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-dairy-supply-disrupted-cyberattack</a></p><p><a href="https://www.securityweek.com/steelmaker-nucor-says-hackers-stole-data-in-recent-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/steelmaker-nucor-says-hackers-stole-data-in-recent-attack/</a></p><p><a href="https://economictimes.indiatimes.com/news/international/us/china-russia-trust-erodes-as-beijings-hackers-go-rogue-launch-cyberattacks-to-steal-ukraine-war-secrets/articleshow/121976975.cms?from=mdr" rel="noopener noreferrer" target="_blank">https://economictimes.indiatimes.com/news/international/us/china-russia-trust-erodes-as-beijings-hackers-go-rogue-launch-cyberattacks-to-steal-ukraine-war-secrets/articleshow/121976975.cms?from=mdr</a></p><p><a href="https://www.securityweek.com/us-braces-for-cyberattacks-after-joining-israel-iran-war/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-braces-for-cyberattacks-after-joining-israel-iran-war/</a></p><p><a href="https://www.politico.com/news/2025/06/22/us-israel-iran-war-cyber-attacks-00417782" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2025/06/22/us-israel-iran-war-cyber-attacks-00417782</a></p><p><a href="https://www.securityweek.com/critical-authentication-bypass-flaw-patched-in-teleport/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-authentication-bypass-flaw-patched-in-teleport/</a></p><p><a href="https://www.securityweek.com/freetype-zero-day-found-by-meta-exploited-in-paragon-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/freetype-zero-day-found-by-meta-exploited-in-paragon-spyware-attacks/</a></p><p><a href="https://therecord.media/doj-moves-to-seize-225-million-in-stolen-crypto" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-moves-to-seize-225-million-in-stolen-crypto</a></p><p><a href="https://www.bankinfosecurity.com/judge-axes-flight-disruption-suit-tied-to-crowdstrike-outage-a-28759" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/judge-axes-flight-disruption-suit-tied-to-crowdstrike-outage-a-28759</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Scattered Spider DESTROYS Insurance Industry | $225M Crypto Seizure | China vs Russia Cyber War</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 932: Today’s episode will discuss the latest news as Scattered Spider DESTROYS Insurance Industry and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel vs Iran Escalates</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia Dairy Supply Disruption</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Freetype Zeroday exploited in Spyware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/aflac-cyberattack-potential-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/aflac-cyberattack-potential-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/</a></p><p><a href="https://therecord.media/russia-dairy-supply-disrupted-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-dairy-supply-disrupted-cyberattack</a></p><p><a href="https://www.securityweek.com/steelmaker-nucor-says-hackers-stole-data-in-recent-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/steelmaker-nucor-says-hackers-stole-data-in-recent-attack/</a></p><p><a href="https://economictimes.indiatimes.com/news/international/us/china-russia-trust-erodes-as-beijings-hackers-go-rogue-launch-cyberattacks-to-steal-ukraine-war-secrets/articleshow/121976975.cms?from=mdr" rel="noopener noreferrer" target="_blank">https://economictimes.indiatimes.com/news/international/us/china-russia-trust-erodes-as-beijings-hackers-go-rogue-launch-cyberattacks-to-steal-ukraine-war-secrets/articleshow/121976975.cms?from=mdr</a></p><p><a href="https://www.securityweek.com/us-braces-for-cyberattacks-after-joining-israel-iran-war/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-braces-for-cyberattacks-after-joining-israel-iran-war/</a></p><p><a href="https://www.politico.com/news/2025/06/22/us-israel-iran-war-cyber-attacks-00417782" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2025/06/22/us-israel-iran-war-cyber-attacks-00417782</a></p><p><a href="https://www.securityweek.com/critical-authentication-bypass-flaw-patched-in-teleport/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-authentication-bypass-flaw-patched-in-teleport/</a></p><p><a href="https://www.securityweek.com/freetype-zero-day-found-by-meta-exploited-in-paragon-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/freetype-zero-day-found-by-meta-exploited-in-paragon-spyware-attacks/</a></p><p><a href="https://therecord.media/doj-moves-to-seize-225-million-in-stolen-crypto" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-moves-to-seize-225-million-in-stolen-crypto</a></p><p><a href="https://www.bankinfosecurity.com/judge-axes-flight-disruption-suit-tied-to-crowdstrike-outage-a-28759" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/judge-axes-flight-disruption-suit-tied-to-crowdstrike-outage-a-28759</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8743a5f8-7a1d-48ce-92e0-ba61e3675eb1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 23 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8743a5f8-7a1d-48ce-92e0-ba61e3675eb1.mp3" length="28162898" type="audio/mpeg"/><itunes:duration>19:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>932</itunes:episode><podcast:episode>932</podcast:episode></item><item><title>BREAKING: China&apos;s Salt Typhoon Hits Major Telecom + $90M Crypto Heist Exposed, Chain IQ Ransomware, China, Iran and Israel’s Cyber Battleground</title><itunes:title>BREAKING: China&apos;s Salt Typhoon Hits Major Telecom + $90M Crypto Heist Exposed, Chain IQ Ransomware, China, Iran and Israel’s Cyber Battleground</itunes:title><description><![CDATA[<p>🎙️ BREAKING: China's Salt Typhoon Hits Major Telecom + $90M Crypto Heist Exposed!</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 931: Today’s episode will discuss the latest news as China's Salt Typhoon Hits Major Telecom and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chain IQ Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel vs Iran Cyber Warfare</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;App Specific Passwords Bypass MFA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/telecom-giant-viasat-breached-by-chinas-salt-typhoon-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telecom-giant-viasat-breached-by-chinas-salt-typhoon-hackers/</a></p><p><a href="https://www.securityweek.com/chain-iq-ubs-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chain-iq-ubs-data-stolen-in-ransomware-attack/</a></p><p><a href="https://therecord.media/5-million-affected-episource-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/5-million-affected-episource-data-breach</a></p><p><a href="https://www.securityweek.com/krispy-kreme-confirms-data-breach-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/krispy-kreme-confirms-data-breach-after-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/</a></p><p><a href="https://therecord.media/iran-internet-outages-israel-conflict" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-internet-outages-israel-conflict</a></p><p><a href="https://therecord.media/keir-giles-russia-expert-email-attack-gtig-citizen-lab-reports" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-giles-russia-expert-email-attack-gtig-citizen-lab-reports</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-attackers-exploiting-linux-flaw-with-poc-exploit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-attackers-exploiting-linux-flaw-with-poc-exploit/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-cisco-atlassian/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-cisco-atlassian/</a></p><p><a href="https://thecyberexpress.com/netscaler-adc-gateway-flaw-cve-2025-5349/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/netscaler-adc-gateway-flaw-cve-2025-5349/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ryuk-ransomwares-initial-access-expert-extradited-to-the-us/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ryuk-ransomwares-initial-access-expert-extradited-to-the-us/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ BREAKING: China's Salt Typhoon Hits Major Telecom + $90M Crypto Heist Exposed!</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 931: Today’s episode will discuss the latest news as China's Salt Typhoon Hits Major Telecom and more other headlines:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chain IQ Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel vs Iran Cyber Warfare</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;App Specific Passwords Bypass MFA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/telecom-giant-viasat-breached-by-chinas-salt-typhoon-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telecom-giant-viasat-breached-by-chinas-salt-typhoon-hackers/</a></p><p><a href="https://www.securityweek.com/chain-iq-ubs-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chain-iq-ubs-data-stolen-in-ransomware-attack/</a></p><p><a href="https://therecord.media/5-million-affected-episource-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/5-million-affected-episource-data-breach</a></p><p><a href="https://www.securityweek.com/krispy-kreme-confirms-data-breach-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/krispy-kreme-confirms-data-breach-after-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/</a></p><p><a href="https://therecord.media/iran-internet-outages-israel-conflict" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-internet-outages-israel-conflict</a></p><p><a href="https://therecord.media/keir-giles-russia-expert-email-attack-gtig-citizen-lab-reports" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-giles-russia-expert-email-attack-gtig-citizen-lab-reports</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-attackers-exploiting-linux-flaw-with-poc-exploit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-attackers-exploiting-linux-flaw-with-poc-exploit/</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-cisco-atlassian/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-by-cisco-atlassian/</a></p><p><a href="https://thecyberexpress.com/netscaler-adc-gateway-flaw-cve-2025-5349/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/netscaler-adc-gateway-flaw-cve-2025-5349/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ryuk-ransomwares-initial-access-expert-extradited-to-the-us/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ryuk-ransomwares-initial-access-expert-extradited-to-the-us/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e021848b-7bc7-4f2a-9ffa-64cf3aa12d54</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 19 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e021848b-7bc7-4f2a-9ffa-64cf3aa12d54.mp3" length="28799868" type="audio/mpeg"/><itunes:duration>20:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>931</itunes:episode><podcast:episode>931</podcast:episode></item><item><title>UBS Confirms Data Stolen in Cyberattack, Minnesota Lawmaker&apos;s Alleged Killer Had Data Broker List, SuperCard Malware Targets Banks</title><itunes:title>UBS Confirms Data Stolen in Cyberattack, Minnesota Lawmaker&apos;s Alleged Killer Had Data Broker List, SuperCard Malware Targets Banks</itunes:title><description><![CDATA[<p>🎙️ UBS Confirms Data Stolen in Cyberattack, Minnesota Lawmaker's Alleged Killer Had Data Broker List, SuperCard Malware Targets Banks</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 930: Today’s episode will discuss the latest news as UBS Confirms Data Stolen in Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scania Insurance Data Stolen in Extortion</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Asana AI Feature Exposed Customer Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cambodian Hacktivists Target Thai Government</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/finance/banking/ubs-says-data-stolen-in-cyberattack-on-supplier-ea0e5217?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/finance/banking/ubs-says-data-stolen-in-cyberattack-on-supplier-ea0e5217?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bleepingcomputer.com/news/security/scania-confirms-insurance-claim-data-breach-in-extortion-attempt/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/scania-confirms-insurance-claim-data-breach-in-extortion-attempt/</a></p><p><a href="https://therecord.media/pro-cambodian-hacktivists-target-thai-websites-amid-border-dispute" rel="noopener noreferrer" target="_blank">https://therecord.media/pro-cambodian-hacktivists-target-thai-websites-amid-border-dispute</a></p><p><a href="https://www.securityweek.com/openai-to-help-dod-with-cyber-defense-under-new-200-million-contract/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-to-help-dod-with-cyber-defense-under-new-200-million-contract/</a></p><p><a href="https://therecord.media/alleged-killer-minnesota-lawmaker-data-brokers-list" rel="noopener noreferrer" target="_blank">https://therecord.media/alleged-killer-minnesota-lawmaker-data-brokers-list</a></p><p><a href="https://www.bleepingcomputer.com/news/security/asana-warns-mcp-ai-feature-exposed-customer-data-to-other-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/asana-warns-mcp-ai-feature-exposed-customer-data-to-other-orgs/</a></p><p><a href="https://therecord.media/supercard-nfc-banking-malware-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/supercard-nfc-banking-malware-russia</a></p><p><a href="https://www.securityweek.com/chrome-137-update-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-137-update-patches-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/code-execution-vulnerabilities-patched-in-veeam-beyondtrust-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-vulnerabilities-patched-in-veeam-beyondtrust-products/</a></p><p><a href="https://www.securityweek.com/zyxel-firewall-vulnerability-again-in-attacker-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zyxel-firewall-vulnerability-again-in-attacker-crosshairs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UBS Confirms Data Stolen in Cyberattack, Minnesota Lawmaker's Alleged Killer Had Data Broker List, SuperCard Malware Targets Banks</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 930: Today’s episode will discuss the latest news as UBS Confirms Data Stolen in Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scania Insurance Data Stolen in Extortion</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Asana AI Feature Exposed Customer Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cambodian Hacktivists Target Thai Government</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/finance/banking/ubs-says-data-stolen-in-cyberattack-on-supplier-ea0e5217?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/finance/banking/ubs-says-data-stolen-in-cyberattack-on-supplier-ea0e5217?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bleepingcomputer.com/news/security/scania-confirms-insurance-claim-data-breach-in-extortion-attempt/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/scania-confirms-insurance-claim-data-breach-in-extortion-attempt/</a></p><p><a href="https://therecord.media/pro-cambodian-hacktivists-target-thai-websites-amid-border-dispute" rel="noopener noreferrer" target="_blank">https://therecord.media/pro-cambodian-hacktivists-target-thai-websites-amid-border-dispute</a></p><p><a href="https://www.securityweek.com/openai-to-help-dod-with-cyber-defense-under-new-200-million-contract/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-to-help-dod-with-cyber-defense-under-new-200-million-contract/</a></p><p><a href="https://therecord.media/alleged-killer-minnesota-lawmaker-data-brokers-list" rel="noopener noreferrer" target="_blank">https://therecord.media/alleged-killer-minnesota-lawmaker-data-brokers-list</a></p><p><a href="https://www.bleepingcomputer.com/news/security/asana-warns-mcp-ai-feature-exposed-customer-data-to-other-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/asana-warns-mcp-ai-feature-exposed-customer-data-to-other-orgs/</a></p><p><a href="https://therecord.media/supercard-nfc-banking-malware-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/supercard-nfc-banking-malware-russia</a></p><p><a href="https://www.securityweek.com/chrome-137-update-patches-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-137-update-patches-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/code-execution-vulnerabilities-patched-in-veeam-beyondtrust-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-vulnerabilities-patched-in-veeam-beyondtrust-products/</a></p><p><a href="https://www.securityweek.com/zyxel-firewall-vulnerability-again-in-attacker-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zyxel-firewall-vulnerability-again-in-attacker-crosshairs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">af349806-263a-444c-b696-30da5e242932</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 18 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/af349806-263a-444c-b696-30da5e242932.mp3" length="25998078" type="audio/mpeg"/><itunes:duration>18:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>930</itunes:episode><podcast:episode>930</podcast:episode></item><item><title>Breaking: Iran-Israel Digital Warfare, Media Giant Breached &amp; US Insurance Companies Under Attack</title><itunes:title>Breaking: Iran-Israel Digital Warfare, Media Giant Breached &amp; US Insurance Companies Under Attack</itunes:title><description><![CDATA[<p>🎙️ Breaking Cyber: Iran-Israel Digital Warfare, Media Giant Breached &amp; US Insurance Companies Under Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 929: Today’s episode will discuss the latest news as Iran-Israel Digital Warfare more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UNFI Attack Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google – Wiz Deal Anti-Trust &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Good Guys Prevail</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/pro-israel-hackers-claim-attack-on-iranian-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/pro-israel-hackers-claim-attack-on-iranian-bank</a></p><p><a href="https://www.jpost.com/middle-east/iran-news/article-858033" rel="noopener noreferrer" target="_blank">https://www.jpost.com/middle-east/iran-news/article-858033</a></p><p><a href="https://www.cybersecuritydive.com/news/us-critical-infrastructure-iran-israel-conflict/750799/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/us-critical-infrastructure-iran-israel-conflict/750799/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/washington-posts-email-system-hacked-journalists-accounts-compromised/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/washington-posts-email-system-hacked-journalists-accounts-compromised/</a></p><p><a href="https://therecord.media/unfi-groceries-supplier-cyberattack-update" rel="noopener noreferrer" target="_blank">https://therecord.media/unfi-groceries-supplier-cyberattack-update</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/</a></p><p><a href="https://www.securityweek.com/googles-32-billion-wiz-deal-draws-doj-antitrust-scrutiny-report/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/googles-32-billion-wiz-deal-draws-doj-antitrust-scrutiny-report/</a></p><p><a href="https://www.cybersecuritydive.com/news/flaw-microsoft-copilot-zero-click-attack/750456/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/flaw-microsoft-copilot-zero-click-attack/750456/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-seizes-archetyp-market-drug-marketplace-arrests-admin/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-seizes-archetyp-market-drug-marketplace-arrests-admin/</a></p><p><a href="https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Breaking Cyber: Iran-Israel Digital Warfare, Media Giant Breached &amp; US Insurance Companies Under Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 929: Today’s episode will discuss the latest news as Iran-Israel Digital Warfare more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UNFI Attack Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google – Wiz Deal Anti-Trust &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Good Guys Prevail</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/pro-israel-hackers-claim-attack-on-iranian-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/pro-israel-hackers-claim-attack-on-iranian-bank</a></p><p><a href="https://www.jpost.com/middle-east/iran-news/article-858033" rel="noopener noreferrer" target="_blank">https://www.jpost.com/middle-east/iran-news/article-858033</a></p><p><a href="https://www.cybersecuritydive.com/news/us-critical-infrastructure-iran-israel-conflict/750799/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/us-critical-infrastructure-iran-israel-conflict/750799/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/washington-posts-email-system-hacked-journalists-accounts-compromised/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/washington-posts-email-system-hacked-journalists-accounts-compromised/</a></p><p><a href="https://therecord.media/unfi-groceries-supplier-cyberattack-update" rel="noopener noreferrer" target="_blank">https://therecord.media/unfi-groceries-supplier-cyberattack-update</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/</a></p><p><a href="https://www.securityweek.com/googles-32-billion-wiz-deal-draws-doj-antitrust-scrutiny-report/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/googles-32-billion-wiz-deal-draws-doj-antitrust-scrutiny-report/</a></p><p><a href="https://www.cybersecuritydive.com/news/flaw-microsoft-copilot-zero-click-attack/750456/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/flaw-microsoft-copilot-zero-click-attack/750456/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-seizes-archetyp-market-drug-marketplace-arrests-admin/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-seizes-archetyp-market-drug-marketplace-arrests-admin/</a></p><p><a href="https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d76cf344-25ed-40ce-b1af-c81415463e8f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 17 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d76cf344-25ed-40ce-b1af-c81415463e8f.mp3" length="25327881" type="audio/mpeg"/><itunes:duration>17:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>929</itunes:episode><podcast:episode>929</podcast:episode></item><item><title>Daily Cyber News: WestJet Grounded by Hackers, 8.4M Zoomcar Users Exposed &amp; 46,000 Grafana Sites at Risk</title><itunes:title>Daily Cyber News: WestJet Grounded by Hackers, 8.4M Zoomcar Users Exposed &amp; 46,000 Grafana Sites at Risk</itunes:title><description><![CDATA[<p>🎙️ Daily Cyber News: WestJet Grounded by Hackers, 8.4M Zoomcar Users Exposed &amp; 46,000 Grafana Sites at Risk</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 928: Today’s episode will discuss the latest news as WestJet Grounded by Hackers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Carolina &amp; Georgia Cyber Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Researcher Hacked</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel and Iran at War!</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/</a></p><p><a href="https://therecord.media/thomasville-nc-government-ogeechee-ga-district-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/thomasville-nc-government-ogeechee-ga-district-cyberattacks</a></p><p><a href="https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-857790#google_vignette" rel="noopener noreferrer" target="_blank">https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-857790#google_vignette</a></p><p><a href="https://www.securityweek.com/zoomcar-says-hackers-accessed-data-of-8-4-million-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zoomcar-says-hackers-accessed-data-of-8-4-million-users/</a></p><p><a href="https://therecord.media/keir-giles-russia-researcher-email-hacked" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-giles-russia-researcher-email-hacked</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-tenable-nessus-agent/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-tenable-nessus-agent/</a></p><p><a href="https://therecord.media/cisa-warns-of-simplehelp-ransomware-compromises" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-warns-of-simplehelp-ransomware-compromises</a></p><p><a href="https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-46-000-grafana-instances-exposed-to-account-takeover-bug/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-46-000-grafana-instances-exposed-to-account-takeover-bug/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Daily Cyber News: WestJet Grounded by Hackers, 8.4M Zoomcar Users Exposed &amp; 46,000 Grafana Sites at Risk</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 928: Today’s episode will discuss the latest news as WestJet Grounded by Hackers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Carolina &amp; Georgia Cyber Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Researcher Hacked</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel and Iran at War!</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/</a></p><p><a href="https://therecord.media/thomasville-nc-government-ogeechee-ga-district-cyberattacks" rel="noopener noreferrer" target="_blank">https://therecord.media/thomasville-nc-government-ogeechee-ga-district-cyberattacks</a></p><p><a href="https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-857790#google_vignette" rel="noopener noreferrer" target="_blank">https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-857790#google_vignette</a></p><p><a href="https://www.securityweek.com/zoomcar-says-hackers-accessed-data-of-8-4-million-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zoomcar-says-hackers-accessed-data-of-8-4-million-users/</a></p><p><a href="https://therecord.media/keir-giles-russia-researcher-email-hacked" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-giles-russia-researcher-email-hacked</a></p><p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-tenable-nessus-agent/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-vulnerabilities-patched-in-tenable-nessus-agent/</a></p><p><a href="https://therecord.media/cisa-warns-of-simplehelp-ransomware-compromises" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-warns-of-simplehelp-ransomware-compromises</a></p><p><a href="https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-46-000-grafana-instances-exposed-to-account-takeover-bug/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-46-000-grafana-instances-exposed-to-account-takeover-bug/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">80ca1bfb-aab5-4955-aae7-7abe3cfaaf1d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 16 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/80ca1bfb-aab5-4955-aae7-7abe3cfaaf1d.mp3" length="22183156" type="audio/mpeg"/><itunes:duration>15:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>928</itunes:episode><podcast:episode>928</podcast:episode></item><item><title>Erie Insurance Cyberattack, Scam Center Takedown in Singapore, Smartwatch for smart attack, UK Free Speech Fight</title><itunes:title>Erie Insurance Cyberattack, Scam Center Takedown in Singapore, Smartwatch for smart attack, UK Free Speech Fight</itunes:title><description><![CDATA[<p>🎙️ Erie Insurance Cyberattack, Scam Center Takedown in Singapore, Smartwatch for smart attack, UK Free Speech Fight</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 927: Today’s episode will discuss the latest news as Erie Insurance Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet &amp; Ivanti Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Free Speech Fight</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cybersecurity Growth &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/</a></p><p><a href="https://therecord.media/asia-scam-center-takedowns-singapore-police" rel="noopener noreferrer" target="_blank">https://therecord.media/asia-scam-center-takedowns-singapore-police</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-patch-high-severity-vulnerabilities" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-patch-high-severity-vulnerabilities</a></p><p><a href="https://thehackernews.com/2025/06/former-black-basta-members-use.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/former-black-basta-members-use.html</a></p><p><a href="https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/</a></p><p><a href="https://therecord.media/4chan-investigation-uk-ofcom-regulator" rel="noopener noreferrer" target="_blank">https://therecord.media/4chan-investigation-uk-ofcom-regulator</a></p><p><a href="https://therecord.media/whatsapp-uk-encryption-fight-apple" rel="noopener noreferrer" target="_blank">https://therecord.media/whatsapp-uk-encryption-fight-apple</a></p><p><a href="https://www.securityweek.com/securonix-acquires-threat-intelligence-firm-threatquotient/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/securonix-acquires-threat-intelligence-firm-threatquotient/</a></p><p><a href="https://www.securityweek.com/cyera-raises-540-million-to-expand-ai-powered-data-security-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyera-raises-540-million-to-expand-ai-powered-data-security-platform/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Erie Insurance Cyberattack, Scam Center Takedown in Singapore, Smartwatch for smart attack, UK Free Speech Fight</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 927: Today’s episode will discuss the latest news as Erie Insurance Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fortinet &amp; Ivanti Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Free Speech Fight</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cybersecurity Growth &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/</a></p><p><a href="https://therecord.media/asia-scam-center-takedowns-singapore-police" rel="noopener noreferrer" target="_blank">https://therecord.media/asia-scam-center-takedowns-singapore-police</a></p><p><a href="https://www.securityweek.com/fortinet-ivanti-patch-high-severity-vulnerabilities" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-ivanti-patch-high-severity-vulnerabilities</a></p><p><a href="https://thehackernews.com/2025/06/former-black-basta-members-use.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/former-black-basta-members-use.html</a></p><p><a href="https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/</a></p><p><a href="https://therecord.media/4chan-investigation-uk-ofcom-regulator" rel="noopener noreferrer" target="_blank">https://therecord.media/4chan-investigation-uk-ofcom-regulator</a></p><p><a href="https://therecord.media/whatsapp-uk-encryption-fight-apple" rel="noopener noreferrer" target="_blank">https://therecord.media/whatsapp-uk-encryption-fight-apple</a></p><p><a href="https://www.securityweek.com/securonix-acquires-threat-intelligence-firm-threatquotient/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/securonix-acquires-threat-intelligence-firm-threatquotient/</a></p><p><a href="https://www.securityweek.com/cyera-raises-540-million-to-expand-ai-powered-data-security-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyera-raises-540-million-to-expand-ai-powered-data-security-platform/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2880bc4c-c109-46ac-97ac-bd596d63729b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 12 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2880bc4c-c109-46ac-97ac-bd596d63729b.mp3" length="30176625" type="audio/mpeg"/><itunes:duration>20:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>927</itunes:episode><podcast:episode>927</podcast:episode></item><item><title>Cybersecurity Patch Tuesday Cadence Released for June, Criminals Pose as Job Seekers, 23andme Grilled by Congress</title><itunes:title>Cybersecurity Patch Tuesday Cadence Released for June, Criminals Pose as Job Seekers, 23andme Grilled by Congress</itunes:title><description><![CDATA[<p>🎙️ Cybersecurity Patch Tuesday Cadence Released for June, Criminals Pose as Job Seekers, 23andme Grilled by Congress</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 926: Today’s episode will discuss the latest news as Cybersecurity Patch Tuesday Cadence Released for June more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Fixes 254 Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Zero Day &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Werewolf crypto mining &nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2025-patch-tuesday-fixes-exploited-zero-day-66-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2025-patch-tuesday-fixes-exploited-zero-day-66-flaws/</a></p><p><a href="https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html</a></p><p><a href="https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/</a></p><p><a href="https://www.securityweek.com/exploited-vulnerability-impacts-over-80000-roundcube-servers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vulnerability-impacts-over-80000-roundcube-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/</a></p><p><a href="https://therecord.media/russian-devices-hit-by-rare-werewolf-crypto-mining" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-devices-hit-by-rare-werewolf-crypto-mining</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-rotating-code-signing-certificates-over-security-concerns/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-rotating-code-signing-certificates-over-security-concerns/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-secure-boot-flaw-lets-attackers-install-bootkit-malware-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-secure-boot-flaw-lets-attackers-install-bootkit-malware-patch-now/</a></p><p><a href="https://therecord.media/23andme-leadership-grilled-by-lawmakers-hearing" rel="noopener noreferrer" target="_blank">https://therecord.media/23andme-leadership-grilled-by-lawmakers-hearing</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cybersecurity Patch Tuesday Cadence Released for June, Criminals Pose as Job Seekers, 23andme Grilled by Congress</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 926: Today’s episode will discuss the latest news as Cybersecurity Patch Tuesday Cadence Released for June more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adobe Fixes 254 Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Zero Day &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Werewolf crypto mining &nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2025-patch-tuesday-fixes-exploited-zero-day-66-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2025-patch-tuesday-fixes-exploited-zero-day-66-flaws/</a></p><p><a href="https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html</a></p><p><a href="https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/</a></p><p><a href="https://www.securityweek.com/exploited-vulnerability-impacts-over-80000-roundcube-servers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vulnerability-impacts-over-80000-roundcube-servers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/</a></p><p><a href="https://therecord.media/russian-devices-hit-by-rare-werewolf-crypto-mining" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-devices-hit-by-rare-werewolf-crypto-mining</a></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-rotating-code-signing-certificates-over-security-concerns/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-rotating-code-signing-certificates-over-security-concerns/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-secure-boot-flaw-lets-attackers-install-bootkit-malware-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-secure-boot-flaw-lets-attackers-install-bootkit-malware-patch-now/</a></p><p><a href="https://therecord.media/23andme-leadership-grilled-by-lawmakers-hearing" rel="noopener noreferrer" target="_blank">https://therecord.media/23andme-leadership-grilled-by-lawmakers-hearing</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">017b4f17-7b06-444e-9ef0-ec2d2d80c77d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 11 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/017b4f17-7b06-444e-9ef0-ec2d2d80c77d.mp3" length="25043878" type="audio/mpeg"/><itunes:duration>17:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>926</itunes:episode><podcast:episode>926</podcast:episode></item><item><title>United Natural Foods Cyberattack, Ticketmaster Data on Sale, FBI Cyber Leadership Change, SentinelOne China Attack</title><itunes:title>United Natural Foods Cyberattack, Ticketmaster Data on Sale, FBI Cyber Leadership Change, SentinelOne China Attack</itunes:title><description><![CDATA[<p>🎙️ United Natural Foods Cyberattack, Ticketmaster Data on Sale, FBI Cyber Leadership Change, SentinelOne China Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 925: Today’s episode will discuss the latest news as United Natural Foods Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NHS Blood Shortage</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targets MSPs &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mirai Botnet Exploits Wazuh Security Platform &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/</a></p><p><a href="https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/stolen-ticketmaster-data-from-snowflake-attacks-briefly-for-sale-again/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stolen-ticketmaster-data-from-snowflake-attacks-briefly-for-sale-again/</a></p><p><a href="https://therecord.media/brett-leatherman-fbi-cyber-replacing-bryan-vorndran" rel="noopener noreferrer" target="_blank">https://therecord.media/brett-leatherman-fbi-cyber-replacing-bryan-vorndran</a></p><p><a href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/scattered-spider-msps-it-vendors-social-engineering/750172/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/scattered-spider-msps-it-vendors-social-engineering/750172/</a></p><p><a href="https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/mirai-botnets-exploiting-wazuh-security-platform-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mirai-botnets-exploiting-wazuh-security-platform-vulnerability/</a></p><p><a href="https://thecyberexpress.com/new-crypto-phishing-campaign/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/new-crypto-phishing-campaign/</a></p><p><a href="https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ United Natural Foods Cyberattack, Ticketmaster Data on Sale, FBI Cyber Leadership Change, SentinelOne China Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 925: Today’s episode will discuss the latest news as United Natural Foods Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NHS Blood Shortage</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Scattered Spider Targets MSPs &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mirai Botnet Exploits Wazuh Security Platform &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/</a></p><p><a href="https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/stolen-ticketmaster-data-from-snowflake-attacks-briefly-for-sale-again/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stolen-ticketmaster-data-from-snowflake-attacks-briefly-for-sale-again/</a></p><p><a href="https://therecord.media/brett-leatherman-fbi-cyber-replacing-bryan-vorndran" rel="noopener noreferrer" target="_blank">https://therecord.media/brett-leatherman-fbi-cyber-replacing-bryan-vorndran</a></p><p><a href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/</a></p><p><a href="https://www.cybersecuritydive.com/news/scattered-spider-msps-it-vendors-social-engineering/750172/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/scattered-spider-msps-it-vendors-social-engineering/750172/</a></p><p><a href="https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/react-native-aria-packages-backdoored-in-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/mirai-botnets-exploiting-wazuh-security-platform-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mirai-botnets-exploiting-wazuh-security-platform-vulnerability/</a></p><p><a href="https://thecyberexpress.com/new-crypto-phishing-campaign/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/new-crypto-phishing-campaign/</a></p><p><a href="https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud" rel="noopener noreferrer" target="_blank">https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">b099eb87-1b79-4061-a30d-9e0ad95cc67a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 10 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/b099eb87-1b79-4061-a30d-9e0ad95cc67a.mp3" length="24666460" type="audio/mpeg"/><itunes:duration>17:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>925</itunes:episode><podcast:episode>925</podcast:episode></item><item><title>President Trump Cybersecurity Executive Order, China Hacking Smartphones, Wiper Malware Targets Ukraine</title><itunes:title>President Trump Cybersecurity Executive Order, China Hacking Smartphones, Wiper Malware Targets Ukraine</itunes:title><description><![CDATA[<p>🎙️ President Trump Cybersecurity Executive Order, China Hacking Smartphones, Wiper Malware Targets Ukraine &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 924: Today’s episode will discuss the latest news as President Trump Cybersecurity Executive Order more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AT&amp;T Data Repackaged</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Optima Tax Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Supply Chain Malware Hits NPM &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/" rel="noopener noreferrer" target="_blank">https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/</a></p><p><a href="https://apnews.com/article/china-cybersecurity-hacking-smartphones-37bb5f10c6e21fec2863b1faf269cecc" rel="noopener noreferrer" target="_blank">https://apnews.com/article/china-cybersecurity-hacking-smartphones-37bb5f10c6e21fec2863b1faf269cecc</a></p><p><a href="https://www.securityweek.com/destructive-pathwiper-targeting-ukraines-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/destructive-pathwiper-targeting-ukraines-critical-infrastructure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/</a></p><p><a href="https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/</a></p><p><a href="https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ President Trump Cybersecurity Executive Order, China Hacking Smartphones, Wiper Malware Targets Ukraine &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 924: Today’s episode will discuss the latest news as President Trump Cybersecurity Executive Order more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AT&amp;T Data Repackaged</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Optima Tax Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Supply Chain Malware Hits NPM &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/" rel="noopener noreferrer" target="_blank">https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/</a></p><p><a href="https://apnews.com/article/china-cybersecurity-hacking-smartphones-37bb5f10c6e21fec2863b1faf269cecc" rel="noopener noreferrer" target="_blank">https://apnews.com/article/china-cybersecurity-hacking-smartphones-37bb5f10c6e21fec2863b1faf269cecc</a></p><p><a href="https://www.securityweek.com/destructive-pathwiper-targeting-ukraines-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/destructive-pathwiper-targeting-ukraines-critical-infrastructure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/</a></p><p><a href="https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/</a></p><p><a href="https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">39e058dd-8f4b-4204-a6ca-6c619015a7cc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 09 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/39e058dd-8f4b-4204-a6ca-6c619015a7cc.mp3" length="26972341" type="audio/mpeg"/><itunes:duration>18:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>924</itunes:episode><podcast:episode>924</podcast:episode></item><item><title>Taming the Hacker Storm: A Way to Defeat Cybercriminals and Malware Feat Roger Grimes of KnowBe4</title><itunes:title>Taming the Hacker Storm: A Way to Defeat Cybercriminals and Malware Feat Roger Grimes of KnowBe4</itunes:title><description><![CDATA[<p>In this special midday broadcast of the <em>CyberHub Podcast</em>, James Azar welcomes back cybersecurity legend <strong>Roger Grimes</strong> to discuss his 16th book, <em>Taming the Hacker Storm: A Framework for Defeating Hackers and Malware</em>. The episode unfolds as a candid, insight-packed conversation that blends hard truths, technical frameworks, and bold calls to action for the future of cybersecurity.</p><p>Roger’s premise is clear: <strong>The internet is broken. Identity is the root issue. And we already have the tools to fix it—we’re just not using them.</strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br>]]></description><content:encoded><![CDATA[<p>In this special midday broadcast of the <em>CyberHub Podcast</em>, James Azar welcomes back cybersecurity legend <strong>Roger Grimes</strong> to discuss his 16th book, <em>Taming the Hacker Storm: A Framework for Defeating Hackers and Malware</em>. The episode unfolds as a candid, insight-packed conversation that blends hard truths, technical frameworks, and bold calls to action for the future of cybersecurity.</p><p>Roger’s premise is clear: <strong>The internet is broken. Identity is the root issue. And we already have the tools to fix it—we’re just not using them.</strong></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">658f7932-fa3d-4189-b487-d41d8a2e20bc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Fri, 06 Jun 2025 11:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/658f7932-fa3d-4189-b487-d41d8a2e20bc.mp3" length="86648136" type="audio/mpeg"/><itunes:duration>01:00:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:episode>922</itunes:episode><podcast:episode>922</podcast:episode></item><item><title>Play Ransomware Hits 900 orgs, Ukraine Claims it Hacked Russian War Plane, CISA Cuts, BidenCash Takedown</title><itunes:title>Play Ransomware Hits 900 orgs, Ukraine Claims it Hacked Russian War Plane, CISA Cuts, BidenCash Takedown</itunes:title><description><![CDATA[<p>🎙️ Play Ransomware Hits 900 orgs, Ukraine Claims it Hacked Russian War Plane, CISA Cuts, BidenCash Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 923: Today’s episode will discuss the latest news as Play Ransomware Hits 900 orgs more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Breach Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Taiwan</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Criminals Target Salesforce apps &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/lee-enterprises-says-40000-hit-by-ransomware-caused-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lee-enterprises-says-40000-hit-by-ransomware-caused-data-breach/</a></p><p><a href="https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/</a></p><p><a href="https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html</a></p><p><a href="https://www.securityweek.com/china-issues-warrants-for-alleged-taiwanese-hackers-and-bans-a-business-for-pro-independence-links/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-issues-warrants-for-alleged-taiwanese-hackers-and-bans-a-business-for-pro-independence-links/</a></p><p><a href="https://therecord.media/google-warns-cybercriminals-targeting-salesforce-apps" rel="noopener noreferrer" target="_blank">https://therecord.media/google-warns-cybercriminals-targeting-salesforce-apps</a></p><p><a href="https://www.securityweek.com/clickfix-attack-exploits-fake-cloudflare-turnstile-to-deliver-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/clickfix-attack-exploits-fake-cloudflare-turnstile-to-deliver-malware/</a></p><p><a href="https://www.bankinfosecurity.com/uae-central-bank-tells-fis-to-drop-sms-otp-authentication-a-28589" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/uae-central-bank-tells-fis-to-drop-sms-otp-authentication-a-28589</a></p><p><a href="https://therecord.media/ftc-chair-implores-congress-to-strengthen-childrens-privacy-law" rel="noopener noreferrer" target="_blank">https://therecord.media/ftc-chair-implores-congress-to-strengthen-childrens-privacy-law</a></p><p><a href="https://www.securityweek.com/carding-marketplace-bidencash-shut-down-by-authorities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/carding-marketplace-bidencash-shut-down-by-authorities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vile-gang-members-sentenced-for-breaching-law-enforcement-portal/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vile-gang-members-sentenced-for-breaching-law-enforcement-portal/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Play Ransomware Hits 900 orgs, Ukraine Claims it Hacked Russian War Plane, CISA Cuts, BidenCash Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 923: Today’s episode will discuss the latest news as Play Ransomware Hits 900 orgs more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Breach Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Taiwan</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Criminals Target Salesforce apps &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/lee-enterprises-says-40000-hit-by-ransomware-caused-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lee-enterprises-says-40000-hit-by-ransomware-caused-data-breach/</a></p><p><a href="https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/</a></p><p><a href="https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html</a></p><p><a href="https://www.securityweek.com/china-issues-warrants-for-alleged-taiwanese-hackers-and-bans-a-business-for-pro-independence-links/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-issues-warrants-for-alleged-taiwanese-hackers-and-bans-a-business-for-pro-independence-links/</a></p><p><a href="https://therecord.media/google-warns-cybercriminals-targeting-salesforce-apps" rel="noopener noreferrer" target="_blank">https://therecord.media/google-warns-cybercriminals-targeting-salesforce-apps</a></p><p><a href="https://www.securityweek.com/clickfix-attack-exploits-fake-cloudflare-turnstile-to-deliver-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/clickfix-attack-exploits-fake-cloudflare-turnstile-to-deliver-malware/</a></p><p><a href="https://www.bankinfosecurity.com/uae-central-bank-tells-fis-to-drop-sms-otp-authentication-a-28589" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/uae-central-bank-tells-fis-to-drop-sms-otp-authentication-a-28589</a></p><p><a href="https://therecord.media/ftc-chair-implores-congress-to-strengthen-childrens-privacy-law" rel="noopener noreferrer" target="_blank">https://therecord.media/ftc-chair-implores-congress-to-strengthen-childrens-privacy-law</a></p><p><a href="https://www.securityweek.com/carding-marketplace-bidencash-shut-down-by-authorities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/carding-marketplace-bidencash-shut-down-by-authorities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vile-gang-members-sentenced-for-breaching-law-enforcement-portal/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vile-gang-members-sentenced-for-breaching-law-enforcement-portal/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">92b77fc1-4f88-44da-a122-dba5e0a4dcd8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 05 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/92b77fc1-4f88-44da-a122-dba5e0a4dcd8.mp3" length="26822503" type="audio/mpeg"/><itunes:duration>18:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>923</itunes:episode><podcast:episode>923</podcast:episode></item><item><title>Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico, OT &amp; ICS Malware, Vodafone Privacy Fine</title><itunes:title>Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico, OT &amp; ICS Malware, Vodafone Privacy Fine</itunes:title><description><![CDATA[<p>🎙️ Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico, OT &amp; ICS Malware, Vodafone Privacy Fine</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 922: Today’s episode will discuss the latest news as Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Coinbase Breach Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lumma Stealer Malware Back &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious PyPi, VPM &amp; Ruby &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/thousands-impacted-by-cyberattacks-states-puerto-rico" rel="noopener noreferrer" target="_blank">https://therecord.media/thousands-impacted-by-cyberattacks-states-puerto-rico</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/</a></p><p><a href="https://www.securityweek.com/victorias-secret-says-it-will-postpone-earnings-report-after-recent-security-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/victorias-secret-says-it-will-postpone-earnings-report-after-recent-security-breach/</a></p><p><a href="https://www.securityweek.com/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift/</a></p><p><a href="https://www.bankinfosecurity.com/lumma-stealer-malware-resurgence-challenges-global-takedown-a-28579" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/lumma-stealer-malware-resurgence-challenges-global-takedown-a-28579</a></p><p><a href="https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hewlett-packard-enterprise-warns-of-critical-storeonce-auth-bypass/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hewlett-packard-enterprise-warns-of-critical-storeonce-auth-bypass/</a></p><p><a href="https://therecord.media/germany-privacy-regulator-fines-vodafone" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-privacy-regulator-fines-vodafone</a></p><p><a href="https://www.securityweek.com/the-uk-brings-cyberwarfare-out-of-the-closet/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-uk-brings-cyberwarfare-out-of-the-closet/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico, OT &amp; ICS Malware, Vodafone Privacy Fine</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 922: Today’s episode will discuss the latest news as Cyberattacks on Gov’t in Ohio, Oklahoma, Puerto Rico more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Coinbase Breach Update</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lumma Stealer Malware Back &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious PyPi, VPM &amp; Ruby &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/thousands-impacted-by-cyberattacks-states-puerto-rico" rel="noopener noreferrer" target="_blank">https://therecord.media/thousands-impacted-by-cyberattacks-states-puerto-rico</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-breach-tied-to-bribed-taskus-support-agents-in-india/</a></p><p><a href="https://www.securityweek.com/victorias-secret-says-it-will-postpone-earnings-report-after-recent-security-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/victorias-secret-says-it-will-postpone-earnings-report-after-recent-security-breach/</a></p><p><a href="https://www.securityweek.com/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift/</a></p><p><a href="https://www.bankinfosecurity.com/lumma-stealer-malware-resurgence-challenges-global-takedown-a-28579" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/lumma-stealer-malware-resurgence-challenges-global-takedown-a-28579</a></p><p><a href="https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hewlett-packard-enterprise-warns-of-critical-storeonce-auth-bypass/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hewlett-packard-enterprise-warns-of-critical-storeonce-auth-bypass/</a></p><p><a href="https://therecord.media/germany-privacy-regulator-fines-vodafone" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-privacy-regulator-fines-vodafone</a></p><p><a href="https://www.securityweek.com/the-uk-brings-cyberwarfare-out-of-the-closet/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-uk-brings-cyberwarfare-out-of-the-closet/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2fdb0911-b909-4281-b310-f5bfadbd9ded</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 04 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2fdb0911-b909-4281-b310-f5bfadbd9ded.mp3" length="25675205" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>922</itunes:episode><podcast:episode>922</podcast:episode></item><item><title>Cartier Data Breach, Credential Stuffing Attack on North Face, Chrome Zero-day, NSO Group Appeal</title><itunes:title>Cartier Data Breach, Credential Stuffing Attack on North Face, Chrome Zero-day, NSO Group Appeal</itunes:title><description><![CDATA[<p>🎙️ Cartier Data Breach, Credential Stuffing Attack on North Face, Chrome Zero-day, NSO Group Appeal</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 921: Today’s episode will discuss the latest news as Cartier Data Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Main Street Bank Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qualcomm GPU Zero-Days</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malaysia Minister Whatsapp Hack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cartier-data-breach-jewelry-maker-warns-customers-that-personal-data-was-exposed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cartier-data-breach-jewelry-maker-warns-customers-that-personal-data-was-exposed/</a></p><p><a href="https://therecord.media/Main-street-cyber-incident-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/Main-street-cyber-incident-bank</a></p><p><a href="https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/</a></p><p><a href="https://www.securityweek.com/over-30-vulnerabilities-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-30-vulnerabilities-patched-in-android/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names/</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/</a></p><p><a href="https://therecord.media/malaysia-hack-scam-whatsapp-minister" rel="noopener noreferrer" target="_blank">https://therecord.media/malaysia-hack-scam-whatsapp-minister</a></p><p><a href="https://therecord.media/nso-group-appeals-jury-award-168million-" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-group-appeals-jury-award-168million-</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cartier Data Breach, Credential Stuffing Attack on North Face, Chrome Zero-day, NSO Group Appeal</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 921: Today’s episode will discuss the latest news as Cartier Data Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Main Street Bank Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qualcomm GPU Zero-Days</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malaysia Minister Whatsapp Hack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cartier-data-breach-jewelry-maker-warns-customers-that-personal-data-was-exposed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cartier-data-breach-jewelry-maker-warns-customers-that-personal-data-was-exposed/</a></p><p><a href="https://therecord.media/Main-street-cyber-incident-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/Main-street-cyber-incident-bank</a></p><p><a href="https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/</a></p><p><a href="https://www.securityweek.com/over-30-vulnerabilities-patched-in-android/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/over-30-vulnerabilities-patched-in-android/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names/</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/</a></p><p><a href="https://therecord.media/malaysia-hack-scam-whatsapp-minister" rel="noopener noreferrer" target="_blank">https://therecord.media/malaysia-hack-scam-whatsapp-minister</a></p><p><a href="https://therecord.media/nso-group-appeals-jury-award-168million-" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-group-appeals-jury-award-168million-</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c5435d2c-9090-42b7-9a5b-8d5ddb1dec54</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 03 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c5435d2c-9090-42b7-9a5b-8d5ddb1dec54.mp3" length="23168077" type="audio/mpeg"/><itunes:duration>16:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>921</itunes:episode><podcast:episode>921</podcast:episode></item><item><title>ConnectWise Breached in Nation-State Cyberattack, AVCheck Taken Down, Modern Phishing Attacks, Insider Threat</title><itunes:title>ConnectWise Breached in Nation-State Cyberattack, AVCheck Taken Down, Modern Phishing Attacks, Insider Threat</itunes:title><description><![CDATA[<p>🎙️ ConnectWise Breached in Nation-State Cyberattack, AVCheck Taken Down, Modern Phishing Attacks, Insider Threat</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 920: Today’s episode will discuss the latest news as ConnectWise Breached in Nation-State Cyber-attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australia Ransomware Reporting &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Sanctions Romance Bait Scam</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Conti Trickbot Leader Unmasked</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/</a></p><p><a href="https://therecord.media/australia-ransomware-victims-must-report-payments" rel="noopener noreferrer" target="_blank">https://therecord.media/australia-ransomware-victims-must-report-payments</a></p><p><a href="https://www.securityweek.com/authorities-take-down-counter-antivirus-service-avcheck/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/authorities-take-down-counter-antivirus-service-avcheck/</a></p><p><a href="https://therecord.media/maine-new-hampshire-cyberattacks-hospital" rel="noopener noreferrer" target="_blank">https://therecord.media/maine-new-hampshire-cyberattacks-hospital</a></p><p><a href="https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html</a></p><p><a href="https://www.securityweek.com/us-government-is-investigating-messages-impersonating-trumps-chief-of-staff-susie-wiles/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-government-is-investigating-messages-impersonating-trumps-chief-of-staff-susie-wiles/</a></p><p><a href="https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government" rel="noopener noreferrer" target="_blank">https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government</a></p><p><a href="https://www.bankinfosecurity.com/us-sanctions-romance-bait-scam-digital-infrastructure-host-a-28563" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-sanctions-romance-bait-scam-digital-infrastructure-host-a-28563</a></p><p><a href="https://www.securityweek.com/alleged-conti-trickbot-gang-leader-unmasked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/alleged-conti-trickbot-gang-leader-unmasked/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ ConnectWise Breached in Nation-State Cyberattack, AVCheck Taken Down, Modern Phishing Attacks, Insider Threat</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 920: Today’s episode will discuss the latest news as ConnectWise Breached in Nation-State Cyber-attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australia Ransomware Reporting &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;US Sanctions Romance Bait Scam</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Conti Trickbot Leader Unmasked</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/</a></p><p><a href="https://therecord.media/australia-ransomware-victims-must-report-payments" rel="noopener noreferrer" target="_blank">https://therecord.media/australia-ransomware-victims-must-report-payments</a></p><p><a href="https://www.securityweek.com/authorities-take-down-counter-antivirus-service-avcheck/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/authorities-take-down-counter-antivirus-service-avcheck/</a></p><p><a href="https://therecord.media/maine-new-hampshire-cyberattacks-hospital" rel="noopener noreferrer" target="_blank">https://therecord.media/maine-new-hampshire-cyberattacks-hospital</a></p><p><a href="https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html</a></p><p><a href="https://www.securityweek.com/us-government-is-investigating-messages-impersonating-trumps-chief-of-staff-susie-wiles/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-government-is-investigating-messages-impersonating-trumps-chief-of-staff-susie-wiles/</a></p><p><a href="https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government" rel="noopener noreferrer" target="_blank">https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government</a></p><p><a href="https://www.bankinfosecurity.com/us-sanctions-romance-bait-scam-digital-infrastructure-host-a-28563" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-sanctions-romance-bait-scam-digital-infrastructure-host-a-28563</a></p><p><a href="https://www.securityweek.com/alleged-conti-trickbot-gang-leader-unmasked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/alleged-conti-trickbot-gang-leader-unmasked/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">02dac072-29cd-46d6-8568-347388faee81</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 02 Jun 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/02dac072-29cd-46d6-8568-347388faee81.mp3" length="28587962" type="audio/mpeg"/><itunes:duration>19:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>920</itunes:episode><podcast:episode>920</podcast:episode></item><item><title>Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access</title><itunes:title>Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access</itunes:title><description><![CDATA[<p>🎙️ Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 919: Today’s episode will discuss the latest news as Victoria’s Secret Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oregon Passes GeoLocation Bill</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Military Cyber Command</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Spies Detained &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/victorias-secret-website-taken-offline-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/victorias-secret-website-taken-offline-after-cyberattack/</a></p><p><a href="https://www.securityweek.com/364000-impacted-by-data-breach-at-lexisnexis-risk-solutions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/364000-impacted-by-data-breach-at-lexisnexis-risk-solutions/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/cellcom-restores-regional-mobile-services-cyberattack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/cellcom-restores-regional-mobile-services-cyberattack</a></p><p><a href="https://therecord.media/oregon-passes-geolocation-kids-data-bill" rel="noopener noreferrer" target="_blank">https://therecord.media/oregon-passes-geolocation-kids-data-bill</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/</a></p><p><a href="https://www.darkreading.com/application-security/hundreds-web-apps-full-access-onedrive-files" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/hundreds-web-apps-full-access-onedrive-files</a></p><p><a href="https://therecord.media/uk-military-new-cyber-electromagnetic-command" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-military-new-cyber-electromagnetic-command</a></p><p><a href="https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/</a></p><p><a href="https://therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes</a></p><p><a href="https://therecord.media/estonia-arrest-warrant-pharmacy-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/estonia-arrest-warrant-pharmacy-data-breach</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Victoria’s Secret Cyberattack, Lexis Nexis Risk Solutions Breach, Google Calendar Abuse, OneDrive Full Access</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 919: Today’s episode will discuss the latest news as Victoria’s Secret Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oregon Passes GeoLocation Bill</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Military Cyber Command</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Spies Detained &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/victorias-secret-website-taken-offline-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/victorias-secret-website-taken-offline-after-cyberattack/</a></p><p><a href="https://www.securityweek.com/364000-impacted-by-data-breach-at-lexisnexis-risk-solutions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/364000-impacted-by-data-breach-at-lexisnexis-risk-solutions/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/cellcom-restores-regional-mobile-services-cyberattack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/cellcom-restores-regional-mobile-services-cyberattack</a></p><p><a href="https://therecord.media/oregon-passes-geolocation-kids-data-bill" rel="noopener noreferrer" target="_blank">https://therecord.media/oregon-passes-geolocation-kids-data-bill</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apt41-malware-abuses-google-calendar-for-stealthy-c2-communication/</a></p><p><a href="https://www.darkreading.com/application-security/hundreds-web-apps-full-access-onedrive-files" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/hundreds-web-apps-full-access-onedrive-files</a></p><p><a href="https://therecord.media/uk-military-new-cyber-electromagnetic-command" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-military-new-cyber-electromagnetic-command</a></p><p><a href="https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/</a></p><p><a href="https://therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes</a></p><p><a href="https://therecord.media/estonia-arrest-warrant-pharmacy-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/estonia-arrest-warrant-pharmacy-data-breach</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">73b6addb-bc44-499c-8e66-deadf8e19aed</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 29 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/73b6addb-bc44-499c-8e66-deadf8e19aed.mp3" length="30653099" type="audio/mpeg"/><itunes:duration>21:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>919</itunes:episode><podcast:episode>919</podcast:episode></item><item><title>MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware</title><itunes:title>MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware</itunes:title><description><![CDATA[<p>🎙️ MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 918: Today’s episode will discuss the latest news as MathWorks Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sheboygan WI Cyber attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukraine Lists Russian Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Indian Police Arrest CyberCrime Gang</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ransomware-sheboygan-breach-notice" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-sheboygan-breach-notice</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mathworks-blames-ransomware-attack-for-ongoing-outages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mathworks-blames-ransomware-attack-for-ongoing-outages/</a></p><p><a href="https://therecord.media/czechia-accuses-china-cyber-espionage-apt31" rel="noopener noreferrer" target="_blank">https://therecord.media/czechia-accuses-china-cyber-espionage-apt31</a></p><p><a href="https://therecord.media/ukraine-media-cyberattacks-russia-ssscip-report" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-media-cyberattacks-russia-ssscip-report</a></p><p><a href="https://www.securityweek.com/iranian-man-pleads-guilty-to-role-in-baltimore-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-man-pleads-guilty-to-role-in-baltimore-ransomware-attack/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/indian-police-arrest-cybercrime-gang-copycats-myanmar-biz-model" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/indian-police-arrest-cybercrime-gang-copycats-myanmar-biz-model</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chrome-137-firefox-139-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-137-firefox-139-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-blocked-over-9-billion-in-apap-store-fraud-since-2020/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/apple/apple-blocked-over-9-billion-in-apap-store-fraud-since-2020/</a></p><p><a href="https://www.securityweek.com/zscaler-to-acquire-mdr-specialist-red-canary/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zscaler-to-acquire-mdr-specialist-red-canary/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ MathWorks Ransomware, Czech Republic Blames China for Cyber Espionage, Iranian Pleads Guilty to Baltimore Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 918: Today’s episode will discuss the latest news as MathWorks Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sheboygan WI Cyber attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukraine Lists Russian Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Indian Police Arrest CyberCrime Gang</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/ransomware-sheboygan-breach-notice" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-sheboygan-breach-notice</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mathworks-blames-ransomware-attack-for-ongoing-outages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mathworks-blames-ransomware-attack-for-ongoing-outages/</a></p><p><a href="https://therecord.media/czechia-accuses-china-cyber-espionage-apt31" rel="noopener noreferrer" target="_blank">https://therecord.media/czechia-accuses-china-cyber-espionage-apt31</a></p><p><a href="https://therecord.media/ukraine-media-cyberattacks-russia-ssscip-report" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-media-cyberattacks-russia-ssscip-report</a></p><p><a href="https://www.securityweek.com/iranian-man-pleads-guilty-to-role-in-baltimore-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-man-pleads-guilty-to-role-in-baltimore-ransomware-attack/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/indian-police-arrest-cybercrime-gang-copycats-myanmar-biz-model" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/indian-police-arrest-cybercrime-gang-copycats-myanmar-biz-model</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/</a></p><p><a href="https://www.securityweek.com/chrome-137-firefox-139-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-137-firefox-139-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-blocked-over-9-billion-in-apap-store-fraud-since-2020/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/apple/apple-blocked-over-9-billion-in-apap-store-fraud-since-2020/</a></p><p><a href="https://www.securityweek.com/zscaler-to-acquire-mdr-specialist-red-canary/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zscaler-to-acquire-mdr-specialist-red-canary/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">87ebc8a0-7187-4d97-87f7-12376f7632a0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 28 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/87ebc8a0-7187-4d97-87f7-12376f7632a0.mp3" length="24595616" type="audio/mpeg"/><itunes:duration>17:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>918</itunes:episode><podcast:episode>918</podcast:episode></item><item><title>Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police</title><itunes:title>Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police</itunes:title><description><![CDATA[<p>🎙️ Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 917: Today’s episode will discuss the latest news as Silent Ransomware Targets Law Firm more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nova Scotia Couple Loses 30K to Hack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3AM Ransomware Spoofs IT Calls</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Commvault CISA Alert</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/law-firms-warned-of-silent-ransom-group-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/law-firms-warned-of-silent-ransom-group-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/adidas-warns-of-data-breach-after-customer-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/adidas-warns-of-data-breach-after-customer-service-provider-hack/</a></p><p><a href="https://www.ctvnews.ca/atlantic/nova-scotia/article/ns-couple-loses-30k-believes-its-due-to-power-utilitys-cybersecurity-breach/" rel="noopener noreferrer" target="_blank">https://www.ctvnews.ca/atlantic/nova-scotia/article/ns-couple-loses-30k-believes-its-due-to-power-utilitys-cybersecurity-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-void-blizzard-cyberspies-linked-to-dutch-police-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-void-blizzard-cyberspies-linked-to-dutch-police-breach/</a></p><p><a href="https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity</a></p><p><a href="https://thehackernews.com/2025/05/russian-hackers-breach-20-ngos-using.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/russian-hackers-breach-20-ngos-using.html</a></p><p><a href="https://therecord.media/commvault-clients-cloud-applications-cyberthreat-cisa-alert" rel="noopener noreferrer" target="_blank">https://therecord.media/commvault-clients-cloud-applications-cyberthreat-cisa-alert</a></p><p><a href="https://www.investing.com/news/company-news/check-point-acquires-veriti-cybersecurity-to-bolster-defense-93CH-4064858" rel="noopener noreferrer" target="_blank">https://www.investing.com/news/company-news/check-point-acquires-veriti-cybersecurity-to-bolster-defense-93CH-4064858</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Silent Ransomware Targets Law Firm, Adidas Warns of Breach, Russian Cyber Activities Target Dutch Police</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 917: Today’s episode will discuss the latest news as Silent Ransomware Targets Law Firm more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nova Scotia Couple Loses 30K to Hack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3AM Ransomware Spoofs IT Calls</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Commvault CISA Alert</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/law-firms-warned-of-silent-ransom-group-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/law-firms-warned-of-silent-ransom-group-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/adidas-warns-of-data-breach-after-customer-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/adidas-warns-of-data-breach-after-customer-service-provider-hack/</a></p><p><a href="https://www.ctvnews.ca/atlantic/nova-scotia/article/ns-couple-loses-30k-believes-its-due-to-power-utilitys-cybersecurity-breach/" rel="noopener noreferrer" target="_blank">https://www.ctvnews.ca/atlantic/nova-scotia/article/ns-couple-loses-30k-believes-its-due-to-power-utilitys-cybersecurity-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-void-blizzard-cyberspies-linked-to-dutch-police-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-void-blizzard-cyberspies-linked-to-dutch-police-breach/</a></p><p><a href="https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-hacker-group-killnet-returns-with-new-identity</a></p><p><a href="https://thehackernews.com/2025/05/russian-hackers-breach-20-ngos-using.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/russian-hackers-breach-20-ngos-using.html</a></p><p><a href="https://therecord.media/commvault-clients-cloud-applications-cyberthreat-cisa-alert" rel="noopener noreferrer" target="_blank">https://therecord.media/commvault-clients-cloud-applications-cyberthreat-cisa-alert</a></p><p><a href="https://www.investing.com/news/company-news/check-point-acquires-veriti-cybersecurity-to-bolster-defense-93CH-4064858" rel="noopener noreferrer" target="_blank">https://www.investing.com/news/company-news/check-point-acquires-veriti-cybersecurity-to-bolster-defense-93CH-4064858</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">00a5a063-3722-4334-b2b1-35c531e95e18</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 27 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/00a5a063-3722-4334-b2b1-35c531e95e18.mp3" length="25119737" type="audio/mpeg"/><itunes:duration>17:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>917</itunes:episode><podcast:episode>917</podcast:episode></item><item><title>Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged</title><itunes:title>Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged</itunes:title><description><![CDATA[<p>🎙️ Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 916: Today’s episode will discuss the latest news as Nova Scotia Power Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;270 Tied to Dark Web Arrested Globally</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious NPM Packages collect Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SEC Disclosure Rule Challenged</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/nova-scotia-power-confirms-ransomware-attack-280k-notified-of-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nova-scotia-power-confirms-ransomware-attack-280k-notified-of-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/</a></p><p><a href="https://www.securityweek.com/cityworks-zero-day-exploited-by-chinese-hackers-in-us-local-government-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cityworks-zero-day-exploited-by-chinese-hackers-in-us-local-government-attacks/</a></p><p><a href="https://thecyberexpress.com/banks-urge-sec-to-end-cyber-disclosure-mandate/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/banks-urge-sec-to-end-cyber-disclosure-mandate/</a></p><p><a href="https://therecord.media/hackers-charged-infrastructure-dismantled-operation-endgame" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-charged-infrastructure-dismantled-operation-endgame</a></p><p><a href="https://therecord.media/global-law-enforcement-arrest-270-tied-to-dark-web-drug-sales" rel="noopener noreferrer" target="_blank">https://therecord.media/global-law-enforcement-arrest-270-tied-to-dark-web-drug-sales</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/</a></p><p><a href="https://www.securityweek.com/signal-adds-screenshot-blocker-to-thwart-windows-recall/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/signal-adds-screenshot-blocker-to-thwart-windows-recall/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bumblebee-malware-distributed-via-zenmap-winmrt-seo-poisoning/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bumblebee-malware-distributed-via-zenmap-winmrt-seo-poisoning/</a></p><p><a href="https://www.securityweek.com/russian-qakbot-gang-leader-indicted-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-qakbot-gang-leader-indicted-in-us/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Nova Scotia Power Ransomware, $223 Million Crypto Heist, Cityworks Zeroday Exploited by China, SEC Disclosure Challenged</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 916: Today’s episode will discuss the latest news as Nova Scotia Power Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;270 Tied to Dark Web Arrested Globally</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious NPM Packages collect Data</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SEC Disclosure Rule Challenged</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/nova-scotia-power-confirms-ransomware-attack-280k-notified-of-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nova-scotia-power-confirms-ransomware-attack-280k-notified-of-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/</a></p><p><a href="https://www.securityweek.com/cityworks-zero-day-exploited-by-chinese-hackers-in-us-local-government-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cityworks-zero-day-exploited-by-chinese-hackers-in-us-local-government-attacks/</a></p><p><a href="https://thecyberexpress.com/banks-urge-sec-to-end-cyber-disclosure-mandate/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/banks-urge-sec-to-end-cyber-disclosure-mandate/</a></p><p><a href="https://therecord.media/hackers-charged-infrastructure-dismantled-operation-endgame" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-charged-infrastructure-dismantled-operation-endgame</a></p><p><a href="https://therecord.media/global-law-enforcement-arrest-270-tied-to-dark-web-drug-sales" rel="noopener noreferrer" target="_blank">https://therecord.media/global-law-enforcement-arrest-270-tied-to-dark-web-drug-sales</a></p><p><a href="https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/</a></p><p><a href="https://www.securityweek.com/signal-adds-screenshot-blocker-to-thwart-windows-recall/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/signal-adds-screenshot-blocker-to-thwart-windows-recall/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bumblebee-malware-distributed-via-zenmap-winmrt-seo-poisoning/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bumblebee-malware-distributed-via-zenmap-winmrt-seo-poisoning/</a></p><p><a href="https://www.securityweek.com/russian-qakbot-gang-leader-indicted-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-qakbot-gang-leader-indicted-in-us/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1ada4aba-2cb4-4cd3-8321-0a64bf9025a9</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 26 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1ada4aba-2cb4-4cd3-8321-0a64bf9025a9.mp3" length="28373549" type="audio/mpeg"/><itunes:duration>19:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>916</itunes:episode><podcast:episode>916</podcast:episode></item><item><title>Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted, China Targets Laid Off Worker, Cisco &amp; GitLab Patch</title><itunes:title>Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted, China Targets Laid Off Worker, Cisco &amp; GitLab Patch</itunes:title><description><![CDATA[<p>🎙️ Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 915: Today’s episode will discuss the latest news as Kettering Health Ransomware Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Laid Off Worker</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Bugs in Versa Concerto</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-breach-orgs-to-track-aid-routes-to-ukraine/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-hackers-breach-orgs-to-track-aid-routes-to-ukraine/</a></p><p><a href="https://www.cybersecuritydive.com/news/china-espionage-campaign-laid-off-workers/748607/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/china-espionage-campaign-laid-off-workers/748607/</a></p><p><a href="https://www.securityweek.com/microsoft-sinkholes-domains-disrupts-notorious-lumma-stealer-malware-operation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-sinkholes-domains-disrupts-notorious-lumma-stealer-malware-operation/</a></p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-dos-privilege-escalation-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-high-severity-dos-privilege-escalation-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/gitlab-atlassian-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gitlab-atlassian-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/unpatched-critical-bugs-in-versa-concerto-lead-to-auth-bypass-rce/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/unpatched-critical-bugs-in-versa-concerto-lead-to-auth-bypass-rce/</a></p><p><a href="https://www.bankinfosecurity.com/scammers-troll-dns-records-for-abandoned-cloud-accounts-a-28456" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/scammers-troll-dns-records-for-abandoned-cloud-accounts-a-28456</a></p><p><a href="https://therecord.media/eu-sanctions-orgs-individuals-tied-to-russia-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-sanctions-orgs-individuals-tied-to-russia-disinformation</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Kettering Health Ransomware Attack, Russia Targets Ukrainian Supply-Chain, Lumma Stealer Disrupted</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 915: Today’s episode will discuss the latest news as Kettering Health Ransomware Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Laid Off Worker</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Critical Bugs in Versa Concerto</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-breach-orgs-to-track-aid-routes-to-ukraine/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-hackers-breach-orgs-to-track-aid-routes-to-ukraine/</a></p><p><a href="https://www.cybersecuritydive.com/news/china-espionage-campaign-laid-off-workers/748607/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/china-espionage-campaign-laid-off-workers/748607/</a></p><p><a href="https://www.securityweek.com/microsoft-sinkholes-domains-disrupts-notorious-lumma-stealer-malware-operation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-sinkholes-domains-disrupts-notorious-lumma-stealer-malware-operation/</a></p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-dos-privilege-escalation-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-high-severity-dos-privilege-escalation-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/gitlab-atlassian-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gitlab-atlassian-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/unpatched-critical-bugs-in-versa-concerto-lead-to-auth-bypass-rce/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/unpatched-critical-bugs-in-versa-concerto-lead-to-auth-bypass-rce/</a></p><p><a href="https://www.bankinfosecurity.com/scammers-troll-dns-records-for-abandoned-cloud-accounts-a-28456" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/scammers-troll-dns-records-for-abandoned-cloud-accounts-a-28456</a></p><p><a href="https://therecord.media/eu-sanctions-orgs-individuals-tied-to-russia-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/eu-sanctions-orgs-individuals-tied-to-russia-disinformation</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3a9c856d-e98c-4d1d-b415-f6c94d4439e9</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 22 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3a9c856d-e98c-4d1d-b415-f6c94d4439e9.mp3" length="23047704" type="audio/mpeg"/><itunes:duration>16:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>915</itunes:episode><podcast:episode>915</podcast:episode></item><item><title>Coinbase Breach Impact Revealed, Cellcom Disruption by Cyberattack, M&amp;S Breach To Hit $402M</title><itunes:title>Coinbase Breach Impact Revealed, Cellcom Disruption by Cyberattack, M&amp;S Breach To Hit $402M</itunes:title><description><![CDATA[<p>🎙️ Coinbase Breach Impact Revealed, Cellcom Disruption by Cyberattack, M&amp;S Breach To Hit $402M</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 914: Today’s episode will discuss the latest news as Coinbase Breach Impact Revealed more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SK Telecom Breach Debrief</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Alabama Cyberattack Neutralized</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Exploitation Continues</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/</a></p><p><a href="https://www.securityweek.com/cellcom-service-disruption-caused-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cellcom-service-disruption-caused-by-cyberattack/</a></p><p><a href="https://therecord.media/major-russian-state-services-disrupted-ddos" rel="noopener noreferrer" target="_blank">https://therecord.media/major-russian-state-services-disrupted-ddos</a></p><p><a href="https://therecord.media/marks-spencer-cyberattack-hit-to-profits-300m" rel="noopener noreferrer" target="_blank">https://therecord.media/marks-spencer-cyberattack-hit-to-profits-300m</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/</a></p><p><a href="https://www.bankinfosecurity.com/debt-collector-hack-affects-long-list-clients-patients-a-28429" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/debt-collector-hack-affects-long-list-clients-patients-a-28429</a></p><p><a href="https://therecord.media/alabama-cyberattack-neutralized" rel="noopener noreferrer" target="_blank">https://therecord.media/alabama-cyberattack-neutralized</a></p><p><a href="https://www.securityweek.com/wiz-warns-of-ongoing-exploitation-of-recent-ivanti-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/wiz-warns-of-ongoing-exploitation-of-recent-ivanti-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/critical-openpgp-js-vulnerability-allows-spoofing/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-openpgp-js-vulnerability-allows-spoofing/</a></p><p><a href="https://www.bankinfosecurity.com/judge-lets-delta-lawsuit-over-crowdstrike-outage-proceed-a-28443" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/judge-lets-delta-lawsuit-over-crowdstrike-outage-proceed-a-28443</a></p><p><a href="https://therecord.media/netherlands-law-criminalizes-cyber-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/netherlands-law-criminalizes-cyber-espionage</a></p><p><a href="https://www.securityweek.com/us-student-to-plead-guilty-over-powerschool-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-student-to-plead-guilty-over-powerschool-hack/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Coinbase Breach Impact Revealed, Cellcom Disruption by Cyberattack, M&amp;S Breach To Hit $402M</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 914: Today’s episode will discuss the latest news as Coinbase Breach Impact Revealed more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SK Telecom Breach Debrief</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Alabama Cyberattack Neutralized</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Exploitation Continues</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/</a></p><p><a href="https://www.securityweek.com/cellcom-service-disruption-caused-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cellcom-service-disruption-caused-by-cyberattack/</a></p><p><a href="https://therecord.media/major-russian-state-services-disrupted-ddos" rel="noopener noreferrer" target="_blank">https://therecord.media/major-russian-state-services-disrupted-ddos</a></p><p><a href="https://therecord.media/marks-spencer-cyberattack-hit-to-profits-300m" rel="noopener noreferrer" target="_blank">https://therecord.media/marks-spencer-cyberattack-hit-to-profits-300m</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/</a></p><p><a href="https://www.bankinfosecurity.com/debt-collector-hack-affects-long-list-clients-patients-a-28429" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/debt-collector-hack-affects-long-list-clients-patients-a-28429</a></p><p><a href="https://therecord.media/alabama-cyberattack-neutralized" rel="noopener noreferrer" target="_blank">https://therecord.media/alabama-cyberattack-neutralized</a></p><p><a href="https://www.securityweek.com/wiz-warns-of-ongoing-exploitation-of-recent-ivanti-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/wiz-warns-of-ongoing-exploitation-of-recent-ivanti-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/critical-openpgp-js-vulnerability-allows-spoofing/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-openpgp-js-vulnerability-allows-spoofing/</a></p><p><a href="https://www.bankinfosecurity.com/judge-lets-delta-lawsuit-over-crowdstrike-outage-proceed-a-28443" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/judge-lets-delta-lawsuit-over-crowdstrike-outage-proceed-a-28443</a></p><p><a href="https://therecord.media/netherlands-law-criminalizes-cyber-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/netherlands-law-criminalizes-cyber-espionage</a></p><p><a href="https://www.securityweek.com/us-student-to-plead-guilty-over-powerschool-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-student-to-plead-guilty-over-powerschool-hack/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cc7483fb-2b61-4e41-8732-3c6e1f6cdc90</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 21 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cc7483fb-2b61-4e41-8732-3c6e1f6cdc90.mp3" length="26119078" type="audio/mpeg"/><itunes:duration>18:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>914</itunes:episode><podcast:episode>914</podcast:episode></item><item><title>Food Supply Chain Under Attack, Ivanti Exploited Again, China Targets Saudi Arabia, O2 Service Vulnerability</title><itunes:title>Food Supply Chain Under Attack, Ivanti Exploited Again, China Targets Saudi Arabia, O2 Service Vulnerability</itunes:title><description><![CDATA[<p>🎙️ Food Supply Chain Under Attack, Ivanti Exploited Again, China Targets Saudi Arabia, O2 Service Vulnerability</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 913: Today’s episode will discuss the latest news as Food Supply Chain Under Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NHS Cyber Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Printer Company Infected Software</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PyPi TikTok &amp; Instagram Exploit</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/peter-green-chilled-ransomware-uk-logistics-company" rel="noopener noreferrer" target="_blank">https://therecord.media/peter-green-chilled-ransomware-uk-logistics-company</a></p><p><a href="https://www.bleepingcomputer.com/news/security/arla-foods-confirms-cyberattack-disrupts-production-causes-delays/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/arla-foods-confirms-cyberattack-disrupts-production-causes-delays/</a></p><p><a href="https://therecord.media/uk-nhs-data-two-cyberattacks-clinical-harm-2024" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nhs-data-two-cyberattacks-clinical-harm-2024</a></p><p><a href="https://www.cybersecuritydive.com/news/ivanti-endpoint-mobile-manager-exploited-vulnerabilities/748464/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ivanti-endpoint-mobile-manager-exploited-vulnerabilities/748464/</a></p><p><a href="https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html</a></p><p><a href="https://www.securityweek.com/o2-service-vulnerability-exposed-user-location/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/o2-service-vulnerability-exposed-user-location/</a></p><p><a href="https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html</a></p><p><a href="https://www.securityweek.com/printer-company-procolored-served-infected-software-for-months/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/printer-company-procolored-served-infected-software-for-months/</a></p><p><a href="https://www.securityweek.com/from-60-to-4000-natos-locked-shields-reflects-cyber-defense-growth/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/from-60-to-4000-natos-locked-shields-reflects-cyber-defense-growth/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Food Supply Chain Under Attack, Ivanti Exploited Again, China Targets Saudi Arabia, O2 Service Vulnerability</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 913: Today’s episode will discuss the latest news as Food Supply Chain Under Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NHS Cyber Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Printer Company Infected Software</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PyPi TikTok &amp; Instagram Exploit</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/peter-green-chilled-ransomware-uk-logistics-company" rel="noopener noreferrer" target="_blank">https://therecord.media/peter-green-chilled-ransomware-uk-logistics-company</a></p><p><a href="https://www.bleepingcomputer.com/news/security/arla-foods-confirms-cyberattack-disrupts-production-causes-delays/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/arla-foods-confirms-cyberattack-disrupts-production-causes-delays/</a></p><p><a href="https://therecord.media/uk-nhs-data-two-cyberattacks-clinical-harm-2024" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nhs-data-two-cyberattacks-clinical-harm-2024</a></p><p><a href="https://www.cybersecuritydive.com/news/ivanti-endpoint-mobile-manager-exploited-vulnerabilities/748464/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ivanti-endpoint-mobile-manager-exploited-vulnerabilities/748464/</a></p><p><a href="https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html</a></p><p><a href="https://www.securityweek.com/o2-service-vulnerability-exposed-user-location/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/o2-service-vulnerability-exposed-user-location/</a></p><p><a href="https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html</a></p><p><a href="https://www.securityweek.com/printer-company-procolored-served-infected-software-for-months/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/printer-company-procolored-served-infected-software-for-months/</a></p><p><a href="https://www.securityweek.com/from-60-to-4000-natos-locked-shields-reflects-cyber-defense-growth/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/from-60-to-4000-natos-locked-shields-reflects-cyber-defense-growth/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0a2cfb22-405c-4f93-8c1e-c3485c38041f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 20 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/0a2cfb22-405c-4f93-8c1e-c3485c38041f.mp3" length="27458219" type="audio/mpeg"/><itunes:duration>19:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>913</itunes:episode><podcast:episode>913</podcast:episode></item><item><title>Coinbase Breach Hype, UK Legal Aid Breach, Japan Offensive Cyber Operations, Chrome Zero Day</title><itunes:title>Coinbase Breach Hype, UK Legal Aid Breach, Japan Offensive Cyber Operations, Chrome Zero Day</itunes:title><description><![CDATA[<p>🎙️ Coinbase Breach Hype, UK Legal Aid Breach, Japan Offensive Cyber Operations, Chrome Zero Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 912: Today’s episode will discuss the latest news as Coinbase Breach Hype more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pwn2Own Berlin</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel Arrests Nomad Bridge Actor &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;12 Charged linked to Crypto Theft &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cyberhubpodcast.com/p/coinbases-insider-breach-what-actually" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/p/coinbases-insider-breach-what-actually</a></p><p><a href="https://therecord.media/uk-legal-aid-agency-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-legal-aid-agency-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/</a></p><p><a href="https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/</a></p><p><a href="https://www.securityweek.com/fbi-warns-of-deepfake-messages-impersonating-senior-officials/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-warns-of-deepfake-messages-impersonating-senior-officials/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-12-more-suspects-linked-to-230-million-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-12-more-suspects-linked-to-230-million-crypto-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/israel-arrests-new-suspect-behind-nomad-bridge-190m-crypto-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/israel-arrests-new-suspect-behind-nomad-bridge-190m-crypto-hack/</a></p><p><a href="https://www.securityweek.com/prison-sentence-for-man-involved-in-sec-x-account-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/prison-sentence-for-man-involved-in-sec-x-account-hack/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Coinbase Breach Hype, UK Legal Aid Breach, Japan Offensive Cyber Operations, Chrome Zero Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 912: Today’s episode will discuss the latest news as Coinbase Breach Hype more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pwn2Own Berlin</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Israel Arrests Nomad Bridge Actor &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;12 Charged linked to Crypto Theft &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cyberhubpodcast.com/p/coinbases-insider-breach-what-actually" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/p/coinbases-insider-breach-what-actually</a></p><p><a href="https://therecord.media/uk-legal-aid-agency-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-legal-aid-agency-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/</a></p><p><a href="https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations" rel="noopener noreferrer" target="_blank">https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/</a></p><p><a href="https://www.securityweek.com/fbi-warns-of-deepfake-messages-impersonating-senior-officials/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-warns-of-deepfake-messages-impersonating-senior-officials/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-12-more-suspects-linked-to-230-million-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-12-more-suspects-linked-to-230-million-crypto-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/israel-arrests-new-suspect-behind-nomad-bridge-190m-crypto-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/israel-arrests-new-suspect-behind-nomad-bridge-190m-crypto-hack/</a></p><p><a href="https://www.securityweek.com/prison-sentence-for-man-involved-in-sec-x-account-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/prison-sentence-for-man-involved-in-sec-x-account-hack/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1ab00115-e284-4a0f-a710-e2a0d8e9329d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 19 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/1ab00115-e284-4a0f-a710-e2a0d8e9329d.mp3" length="27752253" type="audio/mpeg"/><itunes:duration>19:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>912</itunes:episode><podcast:episode>912</podcast:episode></item><item><title>Supply-Chain Carnage: Chinese Hack Drone Makers, Nucor Steel Knocked Offline, Scattered Spider Mauls Retail, Chrome 0-Day</title><itunes:title>Supply-Chain Carnage: Chinese Hack Drone Makers, Nucor Steel Knocked Offline, Scattered Spider Mauls Retail, Chrome 0-Day</itunes:title><description><![CDATA[<p>🎙️ Supply-Chain Carnage: Chinese Hack Drone Makers, Nucor Steel Knocked Offline, Scattered Spider Mauls Retail, Chrome 0-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 911: Today’s episode will discuss the latest news as Supply-Chain Carnage: Chinese Hack Drone Makers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Co-op cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmaker Patch Tuesday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NSA &amp; Cybercommand Leadership Pick</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-hit-drone-sector-in-supply-chain-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-hit-drone-sector-in-supply-chain-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/</a></p><p><a href="https://thecyberexpress.com/co-op-cyberattack-causes-supply-disruptions/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/co-op-cyberattack-causes-supply-disruptions/</a></p><p><a href="https://www.securityweek.com/canadian-electric-utility-lists-customer-information-stolen-by-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-electric-utility-lists-customer-information-stolen-by-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/</a></p><p><a href="https://www.securityweek.com/ransomware-groups-chinese-apts-exploit-recent-sap-netweaver-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-groups-chinese-apts-exploit-recent-sap-netweaver-flaws/</a></p><p><a href="https://www.securityweek.com/chrome-136-update-patches-vulnerability-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-136-update-patches-vulnerability-with-exploit-in-the-wild/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-arm-respond-to-new-cpu-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-arm-respond-to-new-cpu-attacks/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-by-juniper-vmware-and-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-by-juniper-vmware-and-zoom/</a></p><p><a href="https://therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Supply-Chain Carnage: Chinese Hack Drone Makers, Nucor Steel Knocked Offline, Scattered Spider Mauls Retail, Chrome 0-Day</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 911: Today’s episode will discuss the latest news as Supply-Chain Carnage: Chinese Hack Drone Makers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Co-op cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chipmaker Patch Tuesday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NSA &amp; Cybercommand Leadership Pick</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-hit-drone-sector-in-supply-chain-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-hit-drone-sector-in-supply-chain-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/</a></p><p><a href="https://thecyberexpress.com/co-op-cyberattack-causes-supply-disruptions/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/co-op-cyberattack-causes-supply-disruptions/</a></p><p><a href="https://www.securityweek.com/canadian-electric-utility-lists-customer-information-stolen-by-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canadian-electric-utility-lists-customer-information-stolen-by-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/australian-human-rights-commission-leaks-docs-to-search-engines/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/</a></p><p><a href="https://www.securityweek.com/ransomware-groups-chinese-apts-exploit-recent-sap-netweaver-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-groups-chinese-apts-exploit-recent-sap-netweaver-flaws/</a></p><p><a href="https://www.securityweek.com/chrome-136-update-patches-vulnerability-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-136-update-patches-vulnerability-with-exploit-in-the-wild/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-arm-respond-to-new-cpu-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-arm-respond-to-new-cpu-attacks/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-by-juniper-vmware-and-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-by-juniper-vmware-and-zoom/</a></p><p><a href="https://therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6fd66dc0-94ad-48fd-845f-c385182729f7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 15 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6fd66dc0-94ad-48fd-845f-c385182729f7.mp3" length="31888795" type="audio/mpeg"/><itunes:duration>22:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>911</itunes:episode><podcast:episode>911</podcast:episode></item><item><title>5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying</title><itunes:title>5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying</itunes:title><description><![CDATA[<p>🎙️ 5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 910: Today’s episode will discuss the latest news as 5 Microsoft 0days Patched more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SAP Patches Another Netweaver Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti EPMM ZeroDay</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VMWare Tools Vulnerability</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/zero-day-attacks-highlight-another-busy-microsoft-patch-tuesday/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zero-day-attacks-highlight-another-busy-microsoft-patch-tuesday/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/</a></p><p><a href="https://www.securityweek.com/sap-patches-another-critical-netweaver-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-another-critical-netweaver-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/</a></p><p><a href="https://www.securityweek.com/adobe-patches-big-batch-of-critical-severity-software-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-big-batch-of-critical-severity-software-flaws/</a></p><p><a href="https://thecyberexpress.com/vmware-tools-vulnerability-cve-2025-22247/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/vmware-tools-vulnerability-cve-2025-22247/</a></p><p><a href="https://therecord.media/states-push-wechat-for-money-laundering-answers" rel="noopener noreferrer" target="_blank">https://therecord.media/states-push-wechat-for-money-laundering-answers</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-it-worker-scam-china-research/748009/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-it-worker-scam-china-research/748009/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korea-ramps-up-cyberspying-in-ukraine-to-assess-war-risk/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korea-ramps-up-cyberspying-in-ukraine-to-assess-war-risk/</a></p><p><a href="https://therecord.media/alabama-says-cyber-event-could-cause-disruptions" rel="noopener noreferrer" target="_blank">https://therecord.media/alabama-says-cyber-event-could-cause-disruptions</a></p><p><a href="https://www.securityweek.com/marks-spencer-says-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/marks-spencer-says-data-stolen-in-ransomware-attack/</a></p><p><a href="https://thecyberexpress.com/australia-data-breaches-highest-this-decade/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australia-data-breaches-highest-this-decade/</a></p><p><a href="https://www.securityweek.com/microsoft-to-lay-off-about-3-of-its-workforce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-to-lay-off-about-3-of-its-workforce/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 5 Microsoft 0days Patched, Fortinet Zeroday, WeChat Money Laundering, Alabama Cyberattack, Ukraine Cyber Spying</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 910: Today’s episode will discuss the latest news as 5 Microsoft 0days Patched more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SAP Patches Another Netweaver Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti EPMM ZeroDay</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VMWare Tools Vulnerability</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/zero-day-attacks-highlight-another-busy-microsoft-patch-tuesday/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zero-day-attacks-highlight-another-busy-microsoft-patch-tuesday/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/</a></p><p><a href="https://www.securityweek.com/sap-patches-another-critical-netweaver-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-another-critical-netweaver-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/</a></p><p><a href="https://www.securityweek.com/adobe-patches-big-batch-of-critical-severity-software-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-big-batch-of-critical-severity-software-flaws/</a></p><p><a href="https://thecyberexpress.com/vmware-tools-vulnerability-cve-2025-22247/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/vmware-tools-vulnerability-cve-2025-22247/</a></p><p><a href="https://therecord.media/states-push-wechat-for-money-laundering-answers" rel="noopener noreferrer" target="_blank">https://therecord.media/states-push-wechat-for-money-laundering-answers</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korea-it-worker-scam-china-research/748009/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korea-it-worker-scam-china-research/748009/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korea-ramps-up-cyberspying-in-ukraine-to-assess-war-risk/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korea-ramps-up-cyberspying-in-ukraine-to-assess-war-risk/</a></p><p><a href="https://therecord.media/alabama-says-cyber-event-could-cause-disruptions" rel="noopener noreferrer" target="_blank">https://therecord.media/alabama-says-cyber-event-could-cause-disruptions</a></p><p><a href="https://www.securityweek.com/marks-spencer-says-data-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/marks-spencer-says-data-stolen-in-ransomware-attack/</a></p><p><a href="https://thecyberexpress.com/australia-data-breaches-highest-this-decade/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/australia-data-breaches-highest-this-decade/</a></p><p><a href="https://www.securityweek.com/microsoft-to-lay-off-about-3-of-its-workforce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-to-lay-off-about-3-of-its-workforce/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8835809d-50a2-4956-896f-3f4d2fb1a0e6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 14 May 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8835809d-50a2-4956-896f-3f4d2fb1a0e6.mp3" length="35027878" type="audio/mpeg"/><itunes:duration>24:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>910</itunes:episode><podcast:episode>910</podcast:episode></item><item><title>Apple Patches Security Flaws, Microsoft Zeroday Spy Campaign, GlobalX Breach, Co-Op Breach Remains Active</title><itunes:title>Apple Patches Security Flaws, Microsoft Zeroday Spy Campaign, GlobalX Breach, Co-Op Breach Remains Active</itunes:title><description><![CDATA[<p>🎙️ Apple Patches Security Flaws, Microsoft Zeroday Spy Campaign, GlobalX Breach, Co-Op Breach Remains Active</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 909: Today’s episode will discuss the latest news as $ Apple Patches Security Flaws more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Output Messenger Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attacks on Linux</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-patches-major-security-flaws-in-ios-macos-platforms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-major-security-flaws-in-ios-macos-platforms/</a></p><p><a href="https://thecyberexpress.com/marbled-dust-exploit-output-messenger-zero-day/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/marbled-dust-exploit-output-messenger-zero-day/</a></p><p><a href="https://therecord.media/co-op-cyberattack-uk-company-fears-hackers-still-in-system" rel="noopener noreferrer" target="_blank">https://therecord.media/co-op-cyberattack-uk-company-fears-hackers-still-in-system</a></p><p><a href="https://www.securityweek.com/us-deportation-airline-globalx-confirms-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-deportation-airline-globalx-confirms-hack/</a></p><p><a href="https://www.cybersecuritydive.com/news/lee-enterprises-2-million-ransomware-attack/747773/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lee-enterprises-2-million-ransomware-attack/747773/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-testing-clickfix-attacks-against-linux-targets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-testing-clickfix-attacks-against-linux-targets/</a></p><p><a href="https://thehackernews.com/2025/05/asus-patches-driverhub-rce-flaws.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/asus-patches-driverhub-rce-flaws.html</a></p><p><a href="https://thehackernews.com/2025/05/fake-ai-tools-used-to-spread.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/fake-ai-tools-used-to-spread.html</a></p><p><a href="https://therecord.media/bulgarian-members-russian-spy-ring-sentenced-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/bulgarian-members-russian-spy-ring-sentenced-uk</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Apple Patches Security Flaws, Microsoft Zeroday Spy Campaign, GlobalX Breach, Co-Op Breach Remains Active</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 909: Today’s episode will discuss the latest news as $ Apple Patches Security Flaws more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Output Messenger Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ClickFix Attacks on Linux</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-patches-major-security-flaws-in-ios-macos-platforms/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-major-security-flaws-in-ios-macos-platforms/</a></p><p><a href="https://thecyberexpress.com/marbled-dust-exploit-output-messenger-zero-day/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/marbled-dust-exploit-output-messenger-zero-day/</a></p><p><a href="https://therecord.media/co-op-cyberattack-uk-company-fears-hackers-still-in-system" rel="noopener noreferrer" target="_blank">https://therecord.media/co-op-cyberattack-uk-company-fears-hackers-still-in-system</a></p><p><a href="https://www.securityweek.com/us-deportation-airline-globalx-confirms-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-deportation-airline-globalx-confirms-hack/</a></p><p><a href="https://www.cybersecuritydive.com/news/lee-enterprises-2-million-ransomware-attack/747773/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lee-enterprises-2-million-ransomware-attack/747773/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-testing-clickfix-attacks-against-linux-targets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-testing-clickfix-attacks-against-linux-targets/</a></p><p><a href="https://thehackernews.com/2025/05/asus-patches-driverhub-rce-flaws.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/asus-patches-driverhub-rce-flaws.html</a></p><p><a href="https://thehackernews.com/2025/05/fake-ai-tools-used-to-spread.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/fake-ai-tools-used-to-spread.html</a></p><p><a href="https://therecord.media/bulgarian-members-russian-spy-ring-sentenced-uk" rel="noopener noreferrer" target="_blank">https://therecord.media/bulgarian-members-russian-spy-ring-sentenced-uk</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c437c70c-adf0-4132-8505-0b5bb32b8e21</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 13 May 2025 09:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c437c70c-adf0-4132-8505-0b5bb32b8e21.mp3" length="27218728" type="audio/mpeg"/><itunes:duration>18:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>909</itunes:episode><podcast:episode>909</podcast:episode></item><item><title>$2 Billion Hijacks in Japan Trading Hack, $1.3 Billion Google Privacy Settlement, China Targets SAP, Botnet Takedown</title><itunes:title>$2 Billion Hijacks in Japan Trading Hack, $1.3 Billion Google Privacy Settlement, China Targets SAP, Botnet Takedown</itunes:title><description><![CDATA[<p>🎙️ $2 Billion Hijacks in Japan Trading Hack, $1.3 Billion Google Privacy Settlement, China Targets SAP, Botnet Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 908: Today’s episode will discuss the latest news as $2 Billion Hijacks in Japan Trading Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious NPM Packages Target CursorAI</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Deceit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Poland Action on Russia</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hackers-hijack-japan-finance-accounts" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-hijack-japan-finance-accounts</a></p><p><a href="https://www.securityweek.com/malicious-npm-packages-target-cursor-ais-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/malicious-npm-packages-target-cursor-ais-macos-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-behind-attacks-targeting-sap-netweaver-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-behind-attacks-targeting-sap-netweaver-servers/</a></p><p><a href="https://www.securityweek.com/us-announces-botnet-takedown-charges-against-russian-administrators/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-announces-botnet-takedown-charges-against-russian-administrators/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/</a></p><p><a href="https://therecord.media/toronto-school-district-says-data-not-deleted-after-ransom" rel="noopener noreferrer" target="_blank">https://therecord.media/toronto-school-district-says-data-not-deleted-after-ransom</a></p><p><a href="https://therecord.media/poland-shuts-russian-consolate-blames-kremlin-warsaw-fire" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-shuts-russian-consolate-blames-kremlin-warsaw-fire</a></p><p><a href="https://thecyberexpress.com/google-deal-on-data-privacy/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-deal-on-data-privacy/</a></p><p><a href="https://www.securityweek.com/437000-impacted-by-ascension-health-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/437000-impacted-by-ascension-health-data-breach/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ $2 Billion Hijacks in Japan Trading Hack, $1.3 Billion Google Privacy Settlement, China Targets SAP, Botnet Takedown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 908: Today’s episode will discuss the latest news as $2 Billion Hijacks in Japan Trading Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Malicious NPM Packages Target CursorAI</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Deceit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Poland Action on Russia</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hackers-hijack-japan-finance-accounts" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-hijack-japan-finance-accounts</a></p><p><a href="https://www.securityweek.com/malicious-npm-packages-target-cursor-ais-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/malicious-npm-packages-target-cursor-ais-macos-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-behind-attacks-targeting-sap-netweaver-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-behind-attacks-targeting-sap-netweaver-servers/</a></p><p><a href="https://www.securityweek.com/us-announces-botnet-takedown-charges-against-russian-administrators/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-announces-botnet-takedown-charges-against-russian-administrators/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/</a></p><p><a href="https://therecord.media/toronto-school-district-says-data-not-deleted-after-ransom" rel="noopener noreferrer" target="_blank">https://therecord.media/toronto-school-district-says-data-not-deleted-after-ransom</a></p><p><a href="https://therecord.media/poland-shuts-russian-consolate-blames-kremlin-warsaw-fire" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-shuts-russian-consolate-blames-kremlin-warsaw-fire</a></p><p><a href="https://thecyberexpress.com/google-deal-on-data-privacy/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/google-deal-on-data-privacy/</a></p><p><a href="https://www.securityweek.com/437000-impacted-by-ascension-health-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/437000-impacted-by-ascension-health-data-breach/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e8ff50a8-9f47-46e1-bda4-0a19e1e8d92f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 12 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e8ff50a8-9f47-46e1-bda4-0a19e1e8d92f.mp3" length="26374869" type="audio/mpeg"/><itunes:duration>18:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>908</itunes:episode><podcast:episode>908</podcast:episode></item><item><title>South African Airways Cyberattack, Powerschool Criminals extort school districts, Crowdstrike Layoffs, Lockbit Exposed</title><itunes:title>South African Airways Cyberattack, Powerschool Criminals extort school districts, Crowdstrike Layoffs, Lockbit Exposed</itunes:title><description><![CDATA[<p>🎙️ South African Airways Cyberattack, Powerschool Criminals extort school districts, Crowdstrike Layoffs, Lockbit Exposed &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 907: Today’s episode will discuss the latest news as South African Airways Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Masimo Manufacturing Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Data Theft Malware Spotted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/south-african-airways-cyberattack-disrupted" rel="noopener noreferrer" target="_blank">https://therecord.media/south-african-airways-cyberattack-disrupted</a></p><p><a href="https://www.securityweek.com/masimo-manufacturing-facilities-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/masimo-manufacturing-facilities-hit-by-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/powerschool-hacker-now-extorting-individual-school-districts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/powerschool-hacker-now-extorting-individual-school-districts/</a></p><p><a href="https://www.securityweek.com/cisco-patches-35-vulnerabilities-across-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-35-vulnerabilities-across-several-products/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-vpn-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-vpn-flaw-exploited-in-attacks/</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-to-cut-500-jobs-in-plan-to-scale-business/747401/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-to-cut-500-jobs-in-plan-to-scale-business/747401/</a></p><p><a href="https://www.securityweek.com/google-finds-data-theft-malware-used-by-russian-apt-in-select-cases/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-finds-data-theft-malware-used-by-russian-apt-in-select-cases/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/</a></p><p><a href="https://www.securityweek.com/new-uk-framework-pressures-vendors-on-sboms-patching-and-default-mfa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-uk-framework-pressures-vendors-on-sboms-patching-and-default-mfa/</a></p><p><a href="https://therecord.media/uk-spies-see-connection-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-spies-see-connection-russia</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ South African Airways Cyberattack, Powerschool Criminals extort school districts, Crowdstrike Layoffs, Lockbit Exposed &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 907: Today’s episode will discuss the latest news as South African Airways Cyberattack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Masimo Manufacturing Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patches Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Data Theft Malware Spotted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/south-african-airways-cyberattack-disrupted" rel="noopener noreferrer" target="_blank">https://therecord.media/south-african-airways-cyberattack-disrupted</a></p><p><a href="https://www.securityweek.com/masimo-manufacturing-facilities-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/masimo-manufacturing-facilities-hit-by-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/powerschool-hacker-now-extorting-individual-school-districts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/powerschool-hacker-now-extorting-individual-school-districts/</a></p><p><a href="https://www.securityweek.com/cisco-patches-35-vulnerabilities-across-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-35-vulnerabilities-across-several-products/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-vpn-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-vpn-flaw-exploited-in-attacks/</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-to-cut-500-jobs-in-plan-to-scale-business/747401/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-to-cut-500-jobs-in-plan-to-scale-business/747401/</a></p><p><a href="https://www.securityweek.com/google-finds-data-theft-malware-used-by-russian-apt-in-select-cases/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-finds-data-theft-malware-used-by-russian-apt-in-select-cases/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/</a></p><p><a href="https://www.securityweek.com/new-uk-framework-pressures-vendors-on-sboms-patching-and-default-mfa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-uk-framework-pressures-vendors-on-sboms-patching-and-default-mfa/</a></p><p><a href="https://therecord.media/uk-spies-see-connection-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-spies-see-connection-russia</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c4adc765-27b8-44d2-a529-bb6fda176cfd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 08 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c4adc765-27b8-44d2-a529-bb6fda176cfd.mp3" length="26304651" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>907</itunes:episode><podcast:episode>907</podcast:episode></item><item><title>NSO Ordered to Pay $168 Million, iHeart Radio Breach, CISA Budget Cuts &amp; Direction, 0 Click Attacks</title><itunes:title>NSO Ordered to Pay $168 Million, iHeart Radio Breach, CISA Budget Cuts &amp; Direction, 0 Click Attacks</itunes:title><description><![CDATA[<p>🎙️ NSO Ordered to Pay $168 Million, iHeart Radio Breach, CISA Budget Cuts &amp; Direction, 0 Click Attacks &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 906: Today’s episode will discuss the latest news as NSO Ordered to Pay $168 Million more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Telnet 0 Click</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Netweaver Zeroday Compromise</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DDoS for Hire Takedown</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jury-orders-nso-to-pay-meta-168-million-over-whatsapp-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/jury-orders-nso-to-pay-meta-168-million-over-whatsapp-hack</a></p><p><a href="https://therecord.media/iheart-radio-stations-breached-december" rel="noopener noreferrer" target="_blank">https://therecord.media/iheart-radio-stations-breached-december</a></p><p><a href="https://therecord.media/noem-house-hearing-proposed-cisa-funding-cuts" rel="noopener noreferrer" target="_blank">https://therecord.media/noem-house-hearing-proposed-cisa-funding-cuts</a></p><p><a href="https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/</a></p><p><a href="https://www.securityweek.com/second-wave-of-attacks-hitting-sap-netweaver-after-zero-day-compromise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-wave-of-attacks-hitting-sap-netweaver-after-zero-day-compromise/</a></p><p><a href="https://thecyberexpress.com/microsoft-telnet-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/microsoft-telnet-0-click-vulnerability/</a></p><p><a href="https://www.securityweek.com/second-ransomware-group-caught-exploiting-windows-flaw-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-ransomware-group-caught-exploiting-windows-flaw-as-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apache-parquet-exploit-tool-detect-servers-vulnerable-to-critical-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apache-parquet-exploit-tool-detect-servers-vulnerable-to-critical-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-takes-down-six-ddos-for-hire-services-arrests-admins/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-takes-down-six-ddos-for-hire-services-arrests-admins/</a></p><p><a href="https://therecord.media/poland-elections-russia-hybrid-threats-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-elections-russia-hybrid-threats-disinformation</a></p><p><a href="https://www.cybersecuritydive.com/news/airline-north-america-investments-cyber-ai/747253/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/airline-north-america-investments-cyber-ai/747253/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ NSO Ordered to Pay $168 Million, iHeart Radio Breach, CISA Budget Cuts &amp; Direction, 0 Click Attacks &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 906: Today’s episode will discuss the latest news as NSO Ordered to Pay $168 Million more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft Telnet 0 Click</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Netweaver Zeroday Compromise</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DDoS for Hire Takedown</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/jury-orders-nso-to-pay-meta-168-million-over-whatsapp-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/jury-orders-nso-to-pay-meta-168-million-over-whatsapp-hack</a></p><p><a href="https://therecord.media/iheart-radio-stations-breached-december" rel="noopener noreferrer" target="_blank">https://therecord.media/iheart-radio-stations-breached-december</a></p><p><a href="https://therecord.media/noem-house-hearing-proposed-cisa-funding-cuts" rel="noopener noreferrer" target="_blank">https://therecord.media/noem-house-hearing-proposed-cisa-funding-cuts</a></p><p><a href="https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/</a></p><p><a href="https://www.securityweek.com/second-wave-of-attacks-hitting-sap-netweaver-after-zero-day-compromise/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-wave-of-attacks-hitting-sap-netweaver-after-zero-day-compromise/</a></p><p><a href="https://thecyberexpress.com/microsoft-telnet-0-click-vulnerability/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/microsoft-telnet-0-click-vulnerability/</a></p><p><a href="https://www.securityweek.com/second-ransomware-group-caught-exploiting-windows-flaw-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-ransomware-group-caught-exploiting-windows-flaw-as-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apache-parquet-exploit-tool-detect-servers-vulnerable-to-critical-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apache-parquet-exploit-tool-detect-servers-vulnerable-to-critical-flaw/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/police-takes-down-six-ddos-for-hire-services-arrests-admins/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-takes-down-six-ddos-for-hire-services-arrests-admins/</a></p><p><a href="https://therecord.media/poland-elections-russia-hybrid-threats-disinformation" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-elections-russia-hybrid-threats-disinformation</a></p><p><a href="https://www.cybersecuritydive.com/news/airline-north-america-investments-cyber-ai/747253/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/airline-north-america-investments-cyber-ai/747253/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c0491654-b79f-4f17-bb6a-e2146d81660f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 07 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c0491654-b79f-4f17-bb6a-e2146d81660f.mp3" length="26359195" type="audio/mpeg"/><itunes:duration>18:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>906</itunes:episode><podcast:episode>906</podcast:episode></item><item><title>Georgia School District Paralyzed by Ransomware, IT Help Desk Extortion, Wiper Malware n GitHub</title><itunes:title>Georgia School District Paralyzed by Ransomware, IT Help Desk Extortion, Wiper Malware n GitHub</itunes:title><description><![CDATA[<p>🎙️ Georgia School District Paralyzed by Ransomware, IT Help Desk Extortion, Wiper Malware Hidden in GitHub &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 905: Today’s episode will discuss the latest news as UK Georgia School District Paralyzed by Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Western New Mexico University Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Skype Retired Yesterday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Builder Langflow Under Attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hackers-serious-georgia-new-mexico" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-serious-georgia-new-mexico</a></p><p><a href="https://therecord.media/peru-rhysida-ransomware-claims-denied" rel="noopener noreferrer" target="_blank">https://therecord.media/peru-rhysida-ransomware-claims-denied</a></p><p><a href="https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-is-killing-skype-today-pushes-users-to-teams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-is-killing-skype-today-pushes-users-to-teams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/</a></p><p><a href="https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html</a></p><p><a href="https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/</a></p><p><a href="https://www.securityweek.com/android-update-patches-freetype-vulnerability-exploited-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-freetype-vulnerability-exploited-as-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-finds-default-kubernetes-helm-charts-can-expose-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-finds-default-kubernetes-helm-charts-can-expose-data/</a></p><p><a href="https://therecord.media/ukraine-arrests-fsb-agent-spying-recruited-tiktok" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-arrests-fsb-agent-spying-recruited-tiktok</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Georgia School District Paralyzed by Ransomware, IT Help Desk Extortion, Wiper Malware Hidden in GitHub &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 905: Today’s episode will discuss the latest news as UK Georgia School District Paralyzed by Ransomware more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Western New Mexico University Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Skype Retired Yesterday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Builder Langflow Under Attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/hackers-serious-georgia-new-mexico" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-serious-georgia-new-mexico</a></p><p><a href="https://therecord.media/peru-rhysida-ransomware-claims-denied" rel="noopener noreferrer" target="_blank">https://therecord.media/peru-rhysida-ransomware-claims-denied</a></p><p><a href="https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-is-killing-skype-today-pushes-users-to-teams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-is-killing-skype-today-pushes-users-to-teams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/</a></p><p><a href="https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html</a></p><p><a href="https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/</a></p><p><a href="https://www.securityweek.com/android-update-patches-freetype-vulnerability-exploited-as-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-freetype-vulnerability-exploited-as-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-finds-default-kubernetes-helm-charts-can-expose-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-finds-default-kubernetes-helm-charts-can-expose-data/</a></p><p><a href="https://therecord.media/ukraine-arrests-fsb-agent-spying-recruited-tiktok" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-arrests-fsb-agent-spying-recruited-tiktok</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3c988ed6-eeef-4466-aab3-d4cc5eeb1fe8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 06 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3c988ed6-eeef-4466-aab3-d4cc5eeb1fe8.mp3" length="27747238" type="audio/mpeg"/><itunes:duration>19:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>905</itunes:episode><podcast:episode>905</podcast:episode></item><item><title>UK Retailer Harrod’s 🛍️ Cyber Attack, E-Commerce Supply Chain Attacks, TikTok EU GDPR Fine 🕵️‍♂️</title><itunes:title>UK Retailer Harrod’s 🛍️ Cyber Attack, E-Commerce Supply Chain Attacks, TikTok EU GDPR Fine 🕵️‍♂️</itunes:title><description><![CDATA[<p>🎙️ UK Retailer Harrod’s Cyber Attack, E-Commerce Supply Chain Attacks, TikTok EU GDPR Fine &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 904: Today’s episode will discuss the latest news as UK Retailer Harrod’s Cyber Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Attacks on Food</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Black Kingdom Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FinCen Targets Cambodia Cyber Crime</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attacks-on-uk-retailers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attacks-on-uk-retailers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/harrods-the-next-uk-retailer-targeted-in-a-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/harrods-the-next-uk-retailer-targeted-in-a-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/</a></p><p><a href="https://therecord.media/ransomware-attacks-food-and-ag-double-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-attacks-food-and-ag-double-2025</a></p><p><a href="https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/</a></p><p><a href="https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/</a></p><p><a href="https://www.securityweek.com/tiktok-fined-600-million-for-china-data-transfers-that-broke-eu-privacy-rules/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tiktok-fined-600-million-for-china-data-transfers-that-broke-eu-privacy-rules/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-indicts-black-kingdom-ransomware-admin-for-microsoft-exchange-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-indicts-black-kingdom-ransomware-admin-for-microsoft-exchange-attacks/</a></p><p><a href="https://thecyberexpress.com/ukrainian-extradited-for-nefilim-ransomware/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ukrainian-extradited-for-nefilim-ransomware/</a></p><p><a href="https://www.securityweek.com/raytheon-to-pay-8-4-million-in-settlement-over-cybersecurity-failures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/raytheon-to-pay-8-4-million-in-settlement-over-cybersecurity-failures/</a></p><p><a href="https://cyberscoop.com/public-private-threat-intel-sharing-trump-admin/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/public-private-threat-intel-sharing-trump-admin/</a></p><p><a href="https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UK Retailer Harrod’s Cyber Attack, E-Commerce Supply Chain Attacks, TikTok EU GDPR Fine &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 904: Today’s episode will discuss the latest news as UK Retailer Harrod’s Cyber Attack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ransomware Attacks on Food</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Black Kingdom Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FinCen Targets Cambodia Cyber Crime</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attacks-on-uk-retailers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attacks-on-uk-retailers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/harrods-the-next-uk-retailer-targeted-in-a-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/harrods-the-next-uk-retailer-targeted-in-a-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/</a></p><p><a href="https://therecord.media/ransomware-attacks-food-and-ag-double-2025" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-attacks-food-and-ag-double-2025</a></p><p><a href="https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/</a></p><p><a href="https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/</a></p><p><a href="https://www.securityweek.com/tiktok-fined-600-million-for-china-data-transfers-that-broke-eu-privacy-rules/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tiktok-fined-600-million-for-china-data-transfers-that-broke-eu-privacy-rules/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-indicts-black-kingdom-ransomware-admin-for-microsoft-exchange-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-indicts-black-kingdom-ransomware-admin-for-microsoft-exchange-attacks/</a></p><p><a href="https://thecyberexpress.com/ukrainian-extradited-for-nefilim-ransomware/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ukrainian-extradited-for-nefilim-ransomware/</a></p><p><a href="https://www.securityweek.com/raytheon-to-pay-8-4-million-in-settlement-over-cybersecurity-failures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/raytheon-to-pay-8-4-million-in-settlement-over-cybersecurity-failures/</a></p><p><a href="https://cyberscoop.com/public-private-threat-intel-sharing-trump-admin/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/public-private-threat-intel-sharing-trump-admin/</a></p><p><a href="https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3c8b8a21-7695-4763-b649-9be4385aef8f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 05 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3c8b8a21-7695-4763-b649-9be4385aef8f.mp3" length="25078359" type="audio/mpeg"/><itunes:duration>17:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>904</itunes:episode><podcast:episode>904</podcast:episode></item><item><title>Ascension Breach Linked to Cleo Hack, North Korea IT Fraud Hits Fortune 500, Clause AI Exploited</title><itunes:title>Ascension Breach Linked to Cleo Hack, North Korea IT Fraud Hits Fortune 500, Clause AI Exploited</itunes:title><description><![CDATA[<p>🎙️ Ascension Breach Linked to Cleo Hack, North Korea IT Fraud Hits Fortune 500, Clause AI Exploited &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 903: Today’s episode will discuss the latest news as Ascension Breach Linked to Cleo Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Co-op Retailer System Shut Down</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NSO Whatsapp Spyware Case</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukraine &amp; Russia Trade Cyber Blows</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ascension-discloses-data-breach-potentially-linked-to-cleo-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ascension-discloses-data-breach-potentially-linked-to-cleo-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-retailer-co-op-shuts-down-some-it-systems-after-hack-attempt/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-retailer-co-op-shuts-down-some-it-systems-after-hack-attempt/</a></p><p><a href="https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/</a></p><p><a href="https://www.securityweek.com/sentinelone-targeted-by-north-korean-it-workers-ransomware-groups-chinese-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sentinelone-targeted-by-north-korean-it-workers-ransomware-groups-chinese-hackers/</a></p><p><a href="https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html</a></p><p><a href="https://therecord.media/nso-whatsapp-damages-spyware-case" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-whatsapp-damages-spyware-case</a></p><p><a href="https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html</a></p><p><a href="https://www.securityweek.com/sonicwall-flags-two-vulnerabilities-as-exploited/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-flags-two-vulnerabilities-as-exploited/</a></p><p><a href="https://www.securityweek.com/tech-giants-propose-standard-for-end-of-life-security-disclosures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tech-giants-propose-standard-for-end-of-life-security-disclosures/</a></p><p><a href="https://www.cybersecuritydive.com/news/dhs-secretary-vows-to-refocus-cisa-saying-it-strayed-from-mission/746739/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/dhs-secretary-vows-to-refocus-cisa-saying-it-strayed-from-mission/746739/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Ascension Breach Linked to Cleo Hack, North Korea IT Fraud Hits Fortune 500, Clause AI Exploited &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 903: Today’s episode will discuss the latest news as Ascension Breach Linked to Cleo Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Co-op Retailer System Shut Down</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NSO Whatsapp Spyware Case</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ukraine &amp; Russia Trade Cyber Blows</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ascension-discloses-data-breach-potentially-linked-to-cleo-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ascension-discloses-data-breach-potentially-linked-to-cleo-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-retailer-co-op-shuts-down-some-it-systems-after-hack-attempt/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-retailer-co-op-shuts-down-some-it-systems-after-hack-attempt/</a></p><p><a href="https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/</a></p><p><a href="https://www.securityweek.com/sentinelone-targeted-by-north-korean-it-workers-ransomware-groups-chinese-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sentinelone-targeted-by-north-korean-it-workers-ransomware-groups-chinese-hackers/</a></p><p><a href="https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html</a></p><p><a href="https://therecord.media/nso-whatsapp-damages-spyware-case" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-whatsapp-damages-spyware-case</a></p><p><a href="https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html</a></p><p><a href="https://www.securityweek.com/sonicwall-flags-two-vulnerabilities-as-exploited/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-flags-two-vulnerabilities-as-exploited/</a></p><p><a href="https://www.securityweek.com/tech-giants-propose-standard-for-end-of-life-security-disclosures/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tech-giants-propose-standard-for-end-of-life-security-disclosures/</a></p><p><a href="https://www.cybersecuritydive.com/news/dhs-secretary-vows-to-refocus-cisa-saying-it-strayed-from-mission/746739/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/dhs-secretary-vows-to-refocus-cisa-saying-it-strayed-from-mission/746739/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4a6b0579-57ff-4371-8613-519db44296af</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 01 May 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/4a6b0579-57ff-4371-8613-519db44296af.mp3" length="26744762" type="audio/mpeg"/><itunes:duration>18:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>903</itunes:episode><podcast:episode>903</podcast:episode></item><item><title>SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets &amp; Tokens</title><itunes:title>SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets &amp; Tokens</itunes:title><description><![CDATA[<p>🎙️ SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets &amp; Tokens</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 902: Today’s episode will discuss the latest news as SAP ZeroDay Exploit more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Blames Russia for Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Weaponization of EV Batteries</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Zero Day Report</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/</a></p><p><a href="https://therecord.media/nova-scotia-energy-provider-takes-servers-offline" rel="noopener noreferrer" target="_blank">https://therecord.media/nova-scotia-energy-provider-takes-servers-offline</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/</a></p><p><a href="https://therecord.media/kintetsu-world-express-ransomware-attack-japan" rel="noopener noreferrer" target="_blank">https://therecord.media/kintetsu-world-express-ransomware-attack-japan</a></p><p><a href="https://www.securityweek.com/france-blames-russia-for-cyberattacks-on-dozen-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/france-blames-russia-for-cyberattacks-on-dozen-entities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/</a></p><p><a href="https://www.securityweek.com/chinas-secret-weapon-how-ev-batteries-could-be-weaponized-to-disrupt-america/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-secret-weapon-how-ev-batteries-could-be-weaponized-to-disrupt-america/</a></p><p><a href="https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html</a></p><p><a href="https://www.securityweek.com/chrome-136-firefox-138-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-136-firefox-138-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/zero-day-exploits-google-report-vulnerabilities-enterprise/746556/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/zero-day-exploits-google-report-vulnerabilities-enterprise/746556/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets &amp; Tokens</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 902: Today’s episode will discuss the latest news as SAP ZeroDay Exploit more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Blames Russia for Cyberattacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Weaponization of EV Batteries</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Zero Day Report</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/</a></p><p><a href="https://therecord.media/nova-scotia-energy-provider-takes-servers-offline" rel="noopener noreferrer" target="_blank">https://therecord.media/nova-scotia-energy-provider-takes-servers-offline</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sk-telecom-cyberattack-free-sim-replacements-for-25-million-customers/</a></p><p><a href="https://therecord.media/kintetsu-world-express-ransomware-attack-japan" rel="noopener noreferrer" target="_blank">https://therecord.media/kintetsu-world-express-ransomware-attack-japan</a></p><p><a href="https://www.securityweek.com/france-blames-russia-for-cyberattacks-on-dozen-entities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/france-blames-russia-for-cyberattacks-on-dozen-entities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/</a></p><p><a href="https://www.securityweek.com/chinas-secret-weapon-how-ev-batteries-could-be-weaponized-to-disrupt-america/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-secret-weapon-how-ev-batteries-could-be-weaponized-to-disrupt-america/</a></p><p><a href="https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html</a></p><p><a href="https://www.securityweek.com/chrome-136-firefox-138-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-136-firefox-138-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/zero-day-exploits-google-report-vulnerabilities-enterprise/746556/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/zero-day-exploits-google-report-vulnerabilities-enterprise/746556/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fbcd9389-8891-427b-a269-f599700b7332</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 30 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fbcd9389-8891-427b-a269-f599700b7332.mp3" length="25903411" type="audio/mpeg"/><itunes:duration>17:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>902</itunes:episode><podcast:episode>902</podcast:episode></item><item><title>Mark &amp; Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage</title><itunes:title>Mark &amp; Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage</itunes:title><description><![CDATA[<p>🎙️ Mark &amp; Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 901: Today’s episode will discuss the latest news as Mark &amp; Spencer CyberAttack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Baltimore public school ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cookie Bite Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MITRE Launches D3fend CAD Tool</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-hits-british-retailer-marks-spencer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-hits-british-retailer-marks-spencer/</a></p><p><a href="https://www.securityweek.com/korean-telco-giant-sk-telecom-hacked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/korean-telco-giant-sk-telecom-hacked/</a></p><p><a href="https://www.cybersecuritydive.com/news/lemonade-drivers-license-exposed/745762/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lemonade-drivers-license-exposed/745762/</a></p><p><a href="https://therecord.media/baltimore-public-schools-data-breach-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/baltimore-public-schools-data-breach-ransomware</a></p><p><a href="https://www.securityweek.com/microsoft-purges-dormant-azure-tenants-rotates-keys-to-prevent-repeat-nation-state-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-purges-dormant-azure-tenants-rotates-keys-to-prevent-repeat-nation-state-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cookie-bite-attack-poc-uses-chrome-extension-to-steal-session-tokens/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cookie-bite-attack-poc-uses-chrome-extension-to-steal-session-tokens/</a></p><p><a href="https://www.securityweek.com/ssl-com-scrambles-to-patch-certificate-issuance-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ssl-com-scrambles-to-patch-certificate-issuance-vulnerability/</a></p><p><a href="https://therecord.media/dutch-mivd-report-russian-cyber-sabotage" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-mivd-report-russian-cyber-sabotage</a></p><p><a href="https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/</a></p><p><a href="https://thecyberexpress.com/mitre-launches-d3fend-cad-tool/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/mitre-launches-d3fend-cad-tool/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Mark &amp; Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 901: Today’s episode will discuss the latest news as Mark &amp; Spencer CyberAttack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Baltimore public school ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cookie Bite Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;MITRE Launches D3fend CAD Tool</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cyberattack-hits-british-retailer-marks-spencer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-hits-british-retailer-marks-spencer/</a></p><p><a href="https://www.securityweek.com/korean-telco-giant-sk-telecom-hacked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/korean-telco-giant-sk-telecom-hacked/</a></p><p><a href="https://www.cybersecuritydive.com/news/lemonade-drivers-license-exposed/745762/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/lemonade-drivers-license-exposed/745762/</a></p><p><a href="https://therecord.media/baltimore-public-schools-data-breach-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/baltimore-public-schools-data-breach-ransomware</a></p><p><a href="https://www.securityweek.com/microsoft-purges-dormant-azure-tenants-rotates-keys-to-prevent-repeat-nation-state-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-purges-dormant-azure-tenants-rotates-keys-to-prevent-repeat-nation-state-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cookie-bite-attack-poc-uses-chrome-extension-to-steal-session-tokens/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cookie-bite-attack-poc-uses-chrome-extension-to-steal-session-tokens/</a></p><p><a href="https://www.securityweek.com/ssl-com-scrambles-to-patch-certificate-issuance-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ssl-com-scrambles-to-patch-certificate-issuance-vulnerability/</a></p><p><a href="https://therecord.media/dutch-mivd-report-russian-cyber-sabotage" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-mivd-report-russian-cyber-sabotage</a></p><p><a href="https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/</a></p><p><a href="https://thecyberexpress.com/mitre-launches-d3fend-cad-tool/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/mitre-launches-d3fend-cad-tool/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f60c7369-9c4c-43c9-98ac-ce07a04aa6f6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 23 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9d295039-9671-4fa3-97ed-e72fffc75bcd/Mark-Spencer-CyberAttack-SK-Telecom-Hacked-Lemonade-Breach-Russ.mp3" length="22816364" type="audio/mpeg"/><itunes:duration>15:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>901</itunes:episode><podcast:episode>901</podcast:episode></item><item><title>Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill</title><itunes:title>Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill</itunes:title><description><![CDATA[<p>🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Abilene, TX Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimsuky Bluekeep RDP Exploit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Bulletproof Abuse</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thecyberexpress.com/japan-warns-of-hacked-trading-accounts/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/japan-warns-of-hacked-trading-accounts/</a></p><p><a href="https://therecord.media/texas-abilene-offline-cyberattack-systems" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-abilene-offline-cyberattack-systems</a></p><p><a href="https://www.securityweek.com/fresh-windows-ntlm-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fresh-windows-ntlm-vulnerability-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html</a></p><p><a href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/</a></p><p><a href="https://therecord.media/southeast-asia-cyber-fraud-at-inflection-point" rel="noopener noreferrer" target="_blank">https://therecord.media/southeast-asia-cyber-fraud-at-inflection-point</a></p><p><a href="https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html</a></p><p><a href="https://www.cybersecuritydive.com/news/bill-extends-cyber-threat-info-sharing-between-public-private-sector/745551/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/bill-extends-cyber-threat-info-sharing-between-public-private-sector/745551/</a></p><p><a href="https://www.securityweek.com/lantronix-device-used-in-critical-infrastructure-exposes-systems-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lantronix-device-used-in-critical-infrastructure-exposes-systems-to-remote-hacking/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Abilene, TX Cyberattack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimsuky Bluekeep RDP Exploit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Bulletproof Abuse</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thecyberexpress.com/japan-warns-of-hacked-trading-accounts/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/japan-warns-of-hacked-trading-accounts/</a></p><p><a href="https://therecord.media/texas-abilene-offline-cyberattack-systems" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-abilene-offline-cyberattack-systems</a></p><p><a href="https://www.securityweek.com/fresh-windows-ntlm-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fresh-windows-ntlm-vulnerability-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html</a></p><p><a href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/</a></p><p><a href="https://therecord.media/southeast-asia-cyber-fraud-at-inflection-point" rel="noopener noreferrer" target="_blank">https://therecord.media/southeast-asia-cyber-fraud-at-inflection-point</a></p><p><a href="https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html</a></p><p><a href="https://www.cybersecuritydive.com/news/bill-extends-cyber-threat-info-sharing-between-public-private-sector/745551/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/bill-extends-cyber-threat-info-sharing-between-public-private-sector/745551/</a></p><p><a href="https://www.securityweek.com/lantronix-device-used-in-critical-infrastructure-exposes-systems-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lantronix-device-used-in-critical-infrastructure-exposes-systems-to-remote-hacking/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">eb10fd2f-6c7b-44cd-bcf5-ad2549ec8160</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 22 Apr 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b683d774-64d5-4dc8-890b-ca46b516586e/Japan-Trading-Account-Hack-Windows-NTLM-Vulnerability-Exploited.mp3" length="26125347" type="audio/mpeg"/><itunes:duration>18:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>900</itunes:episode><podcast:episode>900</podcast:episode></item><item><title>Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patched</title><itunes:title>Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patched</itunes:title><description><![CDATA[<p>🎙️ Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patch</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 899: Today’s episode will discuss the latest news as Hertz Cleo Data Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ahold Delhaize USA Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Russia with RAT Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Payment Card Scams</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/dutch-cyberattack-stolen-hannafords-grocery" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-cyberattack-stolen-hannafords-grocery</a></p><p><a href="https://www.cybersecuritydive.com/news/hertz-data-breach-cleo/745391/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/hertz-data-breach-cleo/745391/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-target-russian-govt-with-upgraded-rat-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-target-russian-govt-with-upgraded-rat-malware/</a></p><p><a href="https://therecord.media/new-payment-card-scam-involves-malware-tap" rel="noopener noreferrer" target="_blank">https://therecord.media/new-payment-card-scam-involves-malware-tap</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/state-sponsored-hackers-embrace-clickfix-social-engineering-tactic/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/state-sponsored-hackers-embrace-clickfix-social-engineering-tactic/</a></p><p><a href="https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/</a></p><p><a href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/</a></p><p><a href="https://thecyberexpress.com/pytorch-vulnerability-cve-2025-32434/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/pytorch-vulnerability-cve-2025-32434/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/</a></p><p><a href="https://therecord.media/airport-retailer-agrees-to-settlement-ransomware-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/airport-retailer-agrees-to-settlement-ransomware-data-breach</a></p><p><a href="https://cyberscoop.com/deepseek-house-ccp-committee-report-national-security-data-risks/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/deepseek-house-ccp-committee-report-national-security-data-risks/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patch</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 899: Today’s episode will discuss the latest news as Hertz Cleo Data Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ahold Delhaize USA Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Targets Russia with RAT Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Payment Card Scams</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/dutch-cyberattack-stolen-hannafords-grocery" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-cyberattack-stolen-hannafords-grocery</a></p><p><a href="https://www.cybersecuritydive.com/news/hertz-data-breach-cleo/745391/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/hertz-data-breach-cleo/745391/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-target-russian-govt-with-upgraded-rat-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-target-russian-govt-with-upgraded-rat-malware/</a></p><p><a href="https://therecord.media/new-payment-card-scam-involves-malware-tap" rel="noopener noreferrer" target="_blank">https://therecord.media/new-payment-card-scam-involves-malware-tap</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/state-sponsored-hackers-embrace-clickfix-social-engineering-tactic/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/state-sponsored-hackers-embrace-clickfix-social-engineering-tactic/</a></p><p><a href="https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/the-shadow-ai-surge-study-finds-50-of-workers-use-unapproved-ai-tools/</a></p><p><a href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/</a></p><p><a href="https://thecyberexpress.com/pytorch-vulnerability-cve-2025-32434/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/pytorch-vulnerability-cve-2025-32434/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/</a></p><p><a href="https://therecord.media/airport-retailer-agrees-to-settlement-ransomware-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/airport-retailer-agrees-to-settlement-ransomware-data-breach</a></p><p><a href="https://cyberscoop.com/deepseek-house-ccp-committee-report-national-security-data-risks/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/deepseek-house-ccp-committee-report-national-security-data-risks/</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">616ff978-23e2-48f9-b056-857cde95357c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 21 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d125ac21-b766-446e-9a58-98742af38b06/Hertz-Cleo-Data-Breach-Shadow-AI-Usage-ClickFix-Goes-Nation-Sta.mp3" length="28529657" type="audio/mpeg"/><itunes:duration>19:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>899</itunes:episode><podcast:episode>899</podcast:episode></item><item><title>Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook</title><itunes:title>Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook</itunes:title><description><![CDATA[<p>Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook</p><p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback.</p><p><br></p><p>President Trump’s newly escalated tariffs may be aimed at economic revival, but they’re also triggering a supply‑chain shake‑up that will redefine cybersecurity risk. In this special Passover‑week episode, James&nbsp;Azar traces how 245&nbsp;percent duties on Chinese imports—and a 90‑day reprieve for everyone else—are pushing manufacturers to relocate, creating fresh links (and fresh vulnerabilities) in global tech production.</p><p><br></p><p>From semiconductors to IoT devices, James explains the upside of diversifying away from single‑country dependence and the downside of onboarding hundreds of unvetted vendors at once. He lays out the high‑stakes “4‑D chess” of tariffs, the looming threat of retaliatory cyber strikes, and the practical playbook for practitioners: rigorous third‑party audits, real‑time threat intel, tabletop drills, and tighter public‑private alliances.</p><p><br></p><p>Strap in for a fast tour of geopolitics, economics, and actionable cyber strategy—so your organization can seize the opportunity without getting blindsided by the risks.</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook</p><p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback.</p><p><br></p><p>President Trump’s newly escalated tariffs may be aimed at economic revival, but they’re also triggering a supply‑chain shake‑up that will redefine cybersecurity risk. In this special Passover‑week episode, James&nbsp;Azar traces how 245&nbsp;percent duties on Chinese imports—and a 90‑day reprieve for everyone else—are pushing manufacturers to relocate, creating fresh links (and fresh vulnerabilities) in global tech production.</p><p><br></p><p>From semiconductors to IoT devices, James explains the upside of diversifying away from single‑country dependence and the downside of onboarding hundreds of unvetted vendors at once. He lays out the high‑stakes “4‑D chess” of tariffs, the looming threat of retaliatory cyber strikes, and the practical playbook for practitioners: rigorous third‑party audits, real‑time threat intel, tabletop drills, and tighter public‑private alliances.</p><p><br></p><p>Strap in for a fast tour of geopolitics, economics, and actionable cyber strategy—so your organization can seize the opportunity without getting blindsided by the risks.</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;<strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d13394d1-cd01-40db-888a-2e028e86ddd0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 17 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/dd74e73f-8b19-401a-aaee-58f86c87ef7a/Tariffs-Tech-Tensions-and-Cyber-Warfare-The-Practitioner-Playbo.mp3" length="25349197" type="audio/mpeg"/><itunes:duration>17:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>898</itunes:episode><podcast:episode>898</podcast:episode></item><item><title>Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm</title><itunes:title>Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm</itunes:title><description><![CDATA[<p>Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm</p><p>In this eye-opening episode, James Azar dissects the unsustainable rise of cybercrime—now at six trillion dollars—and demands a radical approach to defending our digital frontier. He breaks down the pitfalls of outdated technology, the shortcomings of regulatory efforts, and the untapped power of foreign policy tools like tariffs and visa limitations. Backed by expert voices and industry data, this discussion highlights the need for stronger public-private partnerships, a more aggressive stance against nation-state actors, and a cohesive framework that moves beyond reactive measures to strategic, long-term solutions.</p><ul><li><strong>Take Action:</strong></li><li>Share this episode to spread awareness of the six trillion dollar cybercrime crisis.</li><li>Encourage your local representatives to support higher standards like the CIS Top 20.</li><li>Demand more robust cyber policies, from sanctioning host nations of cyber criminals to empowering agencies like CISA.</li><li>Subscribe, comment, and send your feedback at cyberhubpodcast.com</li></ul><br/><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm</p><p>In this eye-opening episode, James Azar dissects the unsustainable rise of cybercrime—now at six trillion dollars—and demands a radical approach to defending our digital frontier. He breaks down the pitfalls of outdated technology, the shortcomings of regulatory efforts, and the untapped power of foreign policy tools like tariffs and visa limitations. Backed by expert voices and industry data, this discussion highlights the need for stronger public-private partnerships, a more aggressive stance against nation-state actors, and a cohesive framework that moves beyond reactive measures to strategic, long-term solutions.</p><ul><li><strong>Take Action:</strong></li><li>Share this episode to spread awareness of the six trillion dollar cybercrime crisis.</li><li>Encourage your local representatives to support higher standards like the CIS Top 20.</li><li>Demand more robust cyber policies, from sanctioning host nations of cyber criminals to empowering agencies like CISA.</li><li>Subscribe, comment, and send your feedback at cyberhubpodcast.com</li></ul><br/><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c44658f2-3477-411a-88f9-c68884845fa3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 16 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c0847da4-ea77-4f49-8529-f25b83328439/Rebuilding-Cybersecurity-A-New-Global-Strategy-01.mp3" length="24342960" type="audio/mpeg"/><itunes:duration>16:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>897</itunes:episode><podcast:episode>897</podcast:episode></item><item><title>Shadows of the Cyber World: Exposing the Hidden Toll of Online Exploitation</title><itunes:title>Shadows of the Cyber World: Exposing the Hidden Toll of Online Exploitation</itunes:title><description><![CDATA[<p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback.</p><p>This gripping episode dives deep into the human toll of cyber threats—revealing how platforms can become breeding grounds for sextortion, trafficking, and child abuse, all while shining a spotlight on cybersecurity expert Paul Raffaelli’s relentless work in exposing these hidden dangers. Host James Azar shares harrowing statistics on teen suicides, real-life examples of exploitation, and the complex web of vulnerabilities that social media giants struggle to address. As families, educators, and professionals, we must confront these disturbing trends by raising awareness, advocating for better platform accountability, and championing resources that protect the youngest and most vulnerable among us.</p><ul><li><strong>Stay Informed:</strong> Follow key voices like Paul Raffaelli on LinkedIn and support organizations like NCMEC and DHS.</li><li><strong>Spread Awareness:</strong> Share this episode to spark urgent conversations in your community, school boards, and local groups.</li><li><strong>Take Action:</strong> Push for comprehensive policies, volunteer with anti-exploitation programs, and engage in open dialogues with kids about online safety.</li><li><strong>Stay Cyber Safe:</strong> Subscribe, like, and comment to help us reach more people who need this information.</li></ul><br/><p>&nbsp;</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback.</p><p>This gripping episode dives deep into the human toll of cyber threats—revealing how platforms can become breeding grounds for sextortion, trafficking, and child abuse, all while shining a spotlight on cybersecurity expert Paul Raffaelli’s relentless work in exposing these hidden dangers. Host James Azar shares harrowing statistics on teen suicides, real-life examples of exploitation, and the complex web of vulnerabilities that social media giants struggle to address. As families, educators, and professionals, we must confront these disturbing trends by raising awareness, advocating for better platform accountability, and championing resources that protect the youngest and most vulnerable among us.</p><ul><li><strong>Stay Informed:</strong> Follow key voices like Paul Raffaelli on LinkedIn and support organizations like NCMEC and DHS.</li><li><strong>Spread Awareness:</strong> Share this episode to spark urgent conversations in your community, school boards, and local groups.</li><li><strong>Take Action:</strong> Push for comprehensive policies, volunteer with anti-exploitation programs, and engage in open dialogues with kids about online safety.</li><li><strong>Stay Cyber Safe:</strong> Subscribe, like, and comment to help us reach more people who need this information.</li></ul><br/><p>&nbsp;</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">622b1e30-c228-4bd3-8b2f-047535d68967</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 15 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2f7309c6-cb03-46b1-b97e-ec92920b8c8e/The-Human-Cost-of-Cybersecurity-Exploitation-in-the-Digital-Age.mp3" length="21993820" type="audio/mpeg"/><itunes:duration>15:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>896</itunes:episode><podcast:episode>896</podcast:episode></item><item><title>Agentic AI: The Future of Autonomous Cyber Defense and Business Special Episode</title><itunes:title>Agentic AI: The Future of Autonomous Cyber Defense and Business Special Episode</itunes:title><description><![CDATA[<p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. </p><p>In this episode, we explore how Agentic AI—autonomous, decision-making artificial intelligence—is reshaping cybersecurity and business operations at lightning speed. From thwarting ransomware in seconds to handling customer interactions without human oversight, Agentic AI acts as a tireless operative, boosting efficiency and resilience across industries. </p><p>With market forecasts predicting explosive growth and innovative enterprise solutions already emerging, we discuss the technology’s powerful capabilities and inherent risks, offering guidance on secure adoption. Discover how adopting Agentic AI can transform cybersecurity from a cost center into a strategic asset, all while keeping legal, governance, and oversight frameworks front and center.</p><p>Recommended Resources:</p><p>• Microsoft Security Copilot Overview</p><p>• CrowdStrike AI-driven Response Solutions</p><p>• SentinelOne Autonomous Response Platforms</p><p>• Salesforce AI for Business</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  </p><p><br></p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast   </p><p><br></p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p><br></p><p>🤝 For Business Inquiries:  info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p>https://youtu.be/Q9Hp5beyF18</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p>https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p> =============================</p><p>🚀 About The CyberHub Podcast.</p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p> </p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:  info@cyberhubpodcast.com </p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. </p><p>In this episode, we explore how Agentic AI—autonomous, decision-making artificial intelligence—is reshaping cybersecurity and business operations at lightning speed. From thwarting ransomware in seconds to handling customer interactions without human oversight, Agentic AI acts as a tireless operative, boosting efficiency and resilience across industries. </p><p>With market forecasts predicting explosive growth and innovative enterprise solutions already emerging, we discuss the technology’s powerful capabilities and inherent risks, offering guidance on secure adoption. Discover how adopting Agentic AI can transform cybersecurity from a cost center into a strategic asset, all while keeping legal, governance, and oversight frameworks front and center.</p><p>Recommended Resources:</p><p>• Microsoft Security Copilot Overview</p><p>• CrowdStrike AI-driven Response Solutions</p><p>• SentinelOne Autonomous Response Platforms</p><p>• Salesforce AI for Business</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  </p><p><br></p><p>🚨 Important Links to Follow: </p><p>👉Website: https://www.cyberhubpodcast.com/ </p><p>👉Listen here: https://linktr.ee/cyberhubpodcast   </p><p><br></p><p>✅ Stay Connected With Us.</p><p>👉Facebook: https://www.facebook.com/CyberHubpodcast/ </p><p>👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ </p><p>👉Twitter (X): https://twitter.com/cyberhubpodcast </p><p>👉Instagram: https://www.instagram.com/cyberhubpodcast </p><p><br></p><p>🤝 For Business Inquiries:  info@cyberhubpodcast.com</p><p>=============================</p><p>✅ Other Videos You Might Be Interested in Watching: </p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype   </p><p>https://youtube.com/shorts/DNPrsK8GNgM?feature=share </p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack   </p><p>https://youtu.be/Q9Hp5beyF18</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall  </p><p>https://www.youtube.com/watch?v=T7IyvVSj8FY </p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk  </p><p>https://www.youtube.com/watch?v=xBJDDN8djU0 </p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups </p><p>https://youtube.com/live/JnAdR6FeKPg?feature=share</p><p> =============================</p><p>🚀 About The CyberHub Podcast.</p><p><br></p><p>The Hub of the Infosec Community. </p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. </p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news. </p><p> </p><p>For Collaboration and Business inquiries, please use the contact information below:</p><p>📩 Email:  info@cyberhubpodcast.com </p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews </p><p>Disclaimer: We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research. </p><p>Copyright Notice: This video and our YouTube channel contain dialogue, music, and images that are the property of The CyberHub Podcast. You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided. </p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">24dbd254-1da5-4849-909b-ddc2081e55a0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 14 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3424c859-42e6-448a-9fea-0321868272bd/The-Human-Cost-of-Cybersecurity-Exploitation-in-the-Digital-Age.mp3" length="21993820" type="audio/mpeg"/><itunes:duration>15:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>897</itunes:episode><podcast:episode>897</podcast:episode></item><item><title>Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate</title><itunes:title>Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate</itunes:title><description><![CDATA[<p>🎙️ Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 895: Today’s episode will discuss the latest news as Oracle Now Denies Cloud Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sensata Disrupted by Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSRF Bugs in EC2 to Steal AWS</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Wyden Blocks CISA Appointment</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/</a></p><p><a href="https://www.securityweek.com/nissan-leaf-hacked-for-remote-spying-physical-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nissan-leaf-hacked-for-remote-spying-physical-takeover/</a></p><p><a href="https://therecord.media/hartman-cyber-command-nsa-first-senate-apperance" rel="noopener noreferrer" target="_blank">https://therecord.media/hartman-cyber-command-nsa-first-senate-apperance</a></p><p><a href="https://www.securityweek.com/operations-of-sensor-giant-sensata-disrupted-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/operations-of-sensor-giant-sensata-disrupted-by-ransomware-attack/</a></p><p><a href="https://thehackernews.com/2025/04/akirabot-targets-420000-sites-with.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/akirabot-targets-420000-sites-with.html</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-takes-on-cursor-with-firebase-studio-its-ai-builder-for-vibe-coding/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/google/google-takes-on-cursor-with-firebase-studio-its-ai-builder-for-vibe-coding/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/</a></p><p><a href="https://www.securityweek.com/study-identifies-20-most-vulnerable-connected-devices-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/study-identifies-20-most-vulnerable-connected-devices-of-2025/</a></p><p><a href="https://therecord.media/wyden-blocks-plankey-nomination-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-blocks-plankey-nomination-cisa</a></p><p><a href="https://therecord.media/trump-memo-chris-krebs-cisa-sentinelone" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-memo-chris-krebs-cisa-sentinelone</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 895: Today’s episode will discuss the latest news as Oracle Now Denies Cloud Breach more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sensata Disrupted by Ransomware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSRF Bugs in EC2 to Steal AWS</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Wyden Blocks CISA Appointment</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/</a></p><p><a href="https://www.securityweek.com/nissan-leaf-hacked-for-remote-spying-physical-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nissan-leaf-hacked-for-remote-spying-physical-takeover/</a></p><p><a href="https://therecord.media/hartman-cyber-command-nsa-first-senate-apperance" rel="noopener noreferrer" target="_blank">https://therecord.media/hartman-cyber-command-nsa-first-senate-apperance</a></p><p><a href="https://www.securityweek.com/operations-of-sensor-giant-sensata-disrupted-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/operations-of-sensor-giant-sensata-disrupted-by-ransomware-attack/</a></p><p><a href="https://thehackernews.com/2025/04/akirabot-targets-420000-sites-with.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/akirabot-targets-420000-sites-with.html</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-takes-on-cursor-with-firebase-studio-its-ai-builder-for-vibe-coding/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/google/google-takes-on-cursor-with-firebase-studio-its-ai-builder-for-vibe-coding/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/</a></p><p><a href="https://www.securityweek.com/study-identifies-20-most-vulnerable-connected-devices-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/study-identifies-20-most-vulnerable-connected-devices-of-2025/</a></p><p><a href="https://therecord.media/wyden-blocks-plankey-nomination-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/wyden-blocks-plankey-nomination-cisa</a></p><p><a href="https://therecord.media/trump-memo-chris-krebs-cisa-sentinelone" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-memo-chris-krebs-cisa-sentinelone</a></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">85a559dd-bc2e-469d-8135-63f9f921d0e8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 10 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cf6df1d8-de3a-4d92-bb57-81eb2b15a884/Oracle-Now-Denies-Cloud-Breach-Nissan-Leaf-Hacked-Interim-NSA-D.mp3" length="33551437" type="audio/mpeg"/><itunes:duration>23:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>895</itunes:episode><podcast:episode>895</podcast:episode></item><item><title>Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown</title><itunes:title>Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown</itunes:title><description><![CDATA[<p>🎙️ Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 894: Today’s episode will discuss the latest news as Treasury Attacker Lurked Over a Year more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft ZeroDay &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patch Tuesday Breakdown</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NCSC Chinese Used Spyware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/</a></p><p><a href="https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/</a></p><p><a href="https://www.securityweek.com/adobe-calls-urgent-attention-to-critical-coldfusion-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-calls-urgent-attention-to-critical-coldfusion-flaws/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-by-ivanti-vmware-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-by-ivanti-vmware-zoom/</a></p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiswitch-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-critical-fortiswitch-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/</a></p><p><a href="https://www.bankinfosecurity.com/russian-apt-hacker-observed-deploying-unusual-rdp-tactics-a-27953" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/russian-apt-hacker-observed-deploying-unusual-rdp-tactics-a-27953</a></p><p><a href="https://thehackernews.com/2025/04/uac-0226-deploys-giftedcrook-stealer.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/uac-0226-deploys-giftedcrook-stealer.html</a></p><p><a href="https://therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups" rel="noopener noreferrer" target="_blank">https://therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 894: Today’s episode will discuss the latest news as Treasury Attacker Lurked Over a Year more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Microsoft ZeroDay &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patch Tuesday Breakdown</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;NCSC Chinese Used Spyware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/</a></p><p><a href="https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/</a></p><p><a href="https://www.securityweek.com/adobe-calls-urgent-attention-to-critical-coldfusion-flaws/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-calls-urgent-attention-to-critical-coldfusion-flaws/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-by-ivanti-vmware-zoom/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-by-ivanti-vmware-zoom/</a></p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiswitch-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-critical-fortiswitch-vulnerability/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/</a></p><p><a href="https://www.bankinfosecurity.com/russian-apt-hacker-observed-deploying-unusual-rdp-tactics-a-27953" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/russian-apt-hacker-observed-deploying-unusual-rdp-tactics-a-27953</a></p><p><a href="https://thehackernews.com/2025/04/uac-0226-deploys-giftedcrook-stealer.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/uac-0226-deploys-giftedcrook-stealer.html</a></p><p><a href="https://therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups" rel="noopener noreferrer" target="_blank">https://therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c518da4a-972a-4317-bfa8-fe6cbb47fc6d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 09 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b914c665-6bdf-44f3-8364-9ee2be5ae10a/Treasury-Attacker-Lurked-Over-a-Year-Microsoft-ZeroDay-Russian-.mp3" length="30903874" type="audio/mpeg"/><itunes:duration>21:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>894</itunes:episode><podcast:episode>894</podcast:episode></item><item><title>Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again</title><itunes:title>Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again</itunes:title><description><![CDATA[<p>🎙️ Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 893: Today’s episode will discuss the latest news as Australian Pension Fund Hack Rattles Consumers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WK Kellogg Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Andoird Update Patches Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Eset targeted by Malware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/top-australian-pension-funds-breached-in-coordinated-hacks-a-27947" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/top-australian-pension-funds-breached-in-coordinated-hacks-a-27947</a></p><p><a href="https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/</a></p><p><a href="https://therecord.media/uk-court-confirms-apple-suing-over-backdoor-request" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-court-confirms-apple-suing-over-backdoor-request</a></p><p><a href="https://www.securityweek.com/android-update-patches-two-exploited-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-two-exploited-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/threat-actors-set-up-persistent-access-to-hosts-hacked-in-crushftp-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/threat-actors-set-up-persistent-access-to-hosts-hacked-in-crushftp-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/</a></p><p><a href="https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/</a></p><p><a href="https://therecord.media/eset-software-vulnerability-malware-toddycat-apt" rel="noopener noreferrer" target="_blank">https://therecord.media/eset-software-vulnerability-malware-toddycat-apt</a></p><p><a href="https://therecord.media/doppelganger-ceo-arrests-russia-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/doppelganger-ceo-arrests-russia-tech</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 893: Today’s episode will discuss the latest news as Australian Pension Fund Hack Rattles Consumers more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WK Kellogg Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Andoird Update Patches Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Eset targeted by Malware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/top-australian-pension-funds-breached-in-coordinated-hacks-a-27947" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/top-australian-pension-funds-breached-in-coordinated-hacks-a-27947</a></p><p><a href="https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/</a></p><p><a href="https://therecord.media/uk-court-confirms-apple-suing-over-backdoor-request" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-court-confirms-apple-suing-over-backdoor-request</a></p><p><a href="https://www.securityweek.com/android-update-patches-two-exploited-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-update-patches-two-exploited-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/threat-actors-set-up-persistent-access-to-hosts-hacked-in-crushftp-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/threat-actors-set-up-persistent-access-to-hosts-hacked-in-crushftp-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/</a></p><p><a href="https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/</a></p><p><a href="https://therecord.media/eset-software-vulnerability-malware-toddycat-apt" rel="noopener noreferrer" target="_blank">https://therecord.media/eset-software-vulnerability-malware-toddycat-apt</a></p><p><a href="https://therecord.media/doppelganger-ceo-arrests-russia-tech" rel="noopener noreferrer" target="_blank">https://therecord.media/doppelganger-ceo-arrests-russia-tech</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e5354f31-89d8-41e7-a0bf-9fcf6fa2be6b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 08 Apr 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/67bdfb50-3513-4e23-8d5f-d8d8d8763056/Australian-Pension-Fund-Hack-Rattles-Consumers-Apple-Sues-the-U.mp3" length="23873383" type="audio/mpeg"/><itunes:duration>16:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>893</itunes:episode><podcast:episode>893</podcast:episode></item><item><title>Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches</title><itunes:title>Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches</itunes:title><description><![CDATA[<p>🎙️ Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 892: Today’s episode will discuss the latest news as Oracle Confirms Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australia Pension Fund Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Bar Notifies Victims Notified &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WooCommerce API Abuse Attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-confirms-cloud-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-confirms-cloud-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/australian-pension-funds-hit-by-wave-of-credential-stuffing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/australian-pension-funds-hit-by-wave-of-credential-stuffing-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/</a></p><p><a href="https://www.securityweek.com/state-bar-of-texas-says-personal-information-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/state-bar-of-texas-says-personal-information-stolen-in-ransomware-attack/</a></p><p><a href="https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html</a></p><p><a href="https://www.bankinfosecurity.com/chinese-espionage-group-targeting-legacy-ivanti-vpn-devices-a-27939" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/chinese-espionage-group-targeting-legacy-ivanti-vpn-devices-a-27939</a></p><p><a href="https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/</a></p><p><a href="https://www.securityweek.com/critical-apache-parquet-vulnerability-leads-to-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-apache-parquet-vulnerability-leads-to-remote-code-execution/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-fires-nsa-director-head-us-cyber-command/744480/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-fires-nsa-director-head-us-cyber-command/744480/</a></p><p><a href="https://www.wsj.com/tech/trump-grants-75-day-extension-to-reach-tiktok-deal-10f75554?mod=tech_lead_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/trump-grants-75-day-extension-to-reach-tiktok-deal-10f75554?mod=tech_lead_pos4</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 892: Today’s episode will discuss the latest news as Oracle Confirms Hack more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Australia Pension Fund Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Bar Notifies Victims Notified &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;WooCommerce API Abuse Attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-confirms-cloud-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-confirms-cloud-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/australian-pension-funds-hit-by-wave-of-credential-stuffing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/australian-pension-funds-hit-by-wave-of-credential-stuffing-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/</a></p><p><a href="https://www.securityweek.com/state-bar-of-texas-says-personal-information-stolen-in-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/state-bar-of-texas-says-personal-information-stolen-in-ransomware-attack/</a></p><p><a href="https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html</a></p><p><a href="https://www.bankinfosecurity.com/chinese-espionage-group-targeting-legacy-ivanti-vpn-devices-a-27939" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/chinese-espionage-group-targeting-legacy-ivanti-vpn-devices-a-27939</a></p><p><a href="https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/</a></p><p><a href="https://www.securityweek.com/critical-apache-parquet-vulnerability-leads-to-remote-code-execution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-apache-parquet-vulnerability-leads-to-remote-code-execution/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-fires-nsa-director-head-us-cyber-command/744480/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-fires-nsa-director-head-us-cyber-command/744480/</a></p><p><a href="https://www.wsj.com/tech/trump-grants-75-day-extension-to-reach-tiktok-deal-10f75554?mod=tech_lead_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/trump-grants-75-day-extension-to-reach-tiktok-deal-10f75554?mod=tech_lead_pos4</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">b88f8705-50a5-431f-81b9-d19ba366996f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 07 Apr 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/83e6aa87-1409-4d61-af9d-d32f706f3b3b/Oracle-Confirms-Hack-NSA-Director-Fired-China-Targets-Ivanti-Ag.mp3" length="30686953" type="audio/mpeg"/><itunes:duration>21:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>892</itunes:episode><podcast:episode>892</podcast:episode></item><item><title>KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&amp;A News</title><itunes:title>KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&amp;A News</itunes:title><description><![CDATA[<p>🎙️ KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&amp;A News</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 891: Today’s episode will discuss the latest news as KidFlix On Dark Web Shut Down more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Native Minnesota Tribe Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FTC Chief Flags 23andme bankruptcy &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Meraki &amp; ECE DoS attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/police-shuts-down-kidflix-child-sexual-exploitation-platform/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-shuts-down-kidflix-child-sexual-exploitation-platform/</a></p><p><a href="https://www.securityweek.com/39-million-secrets-leaked-on-github-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/39-million-secrets-leaked-on-github-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/royal-mail-investigates-data-leak-claims-no-impact-on-operations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/royal-mail-investigates-data-leak-claims-no-impact-on-operations/</a></p><p><a href="https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino" rel="noopener noreferrer" target="_blank">https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino</a></p><p><a href="https://www.cybersecuritydive.com/news/ftc-chief-flags-data-privacy-risks-23andme-bankruptcy/744184/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ftc-chief-flags-data-privacy-risks-23andme-bankruptcy/744184/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-expose-cisco-meraki-and-ece-products-to-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-expose-cisco-meraki-and-ece-products-to-dos-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/verizon-call-filter-api-flaw-exposed-customers-incoming-call-history/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/verizon-call-filter-api-flaw-exposed-customers-incoming-call-history/</a></p><p><a href="https://thehackernews.com/2025/04/google-patches-quick-share.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/google-patches-quick-share.html</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-23-deals-announced-in-march-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-23-deals-announced-in-march-2025/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&amp;A News</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 891: Today’s episode will discuss the latest news as KidFlix On Dark Web Shut Down more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Native Minnesota Tribe Cyber Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FTC Chief Flags 23andme bankruptcy &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Meraki &amp; ECE DoS attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/police-shuts-down-kidflix-child-sexual-exploitation-platform/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/police-shuts-down-kidflix-child-sexual-exploitation-platform/</a></p><p><a href="https://www.securityweek.com/39-million-secrets-leaked-on-github-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/39-million-secrets-leaked-on-github-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/royal-mail-investigates-data-leak-claims-no-impact-on-operations/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/royal-mail-investigates-data-leak-claims-no-impact-on-operations/</a></p><p><a href="https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino" rel="noopener noreferrer" target="_blank">https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino</a></p><p><a href="https://www.cybersecuritydive.com/news/ftc-chief-flags-data-privacy-risks-23andme-bankruptcy/744184/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ftc-chief-flags-data-privacy-risks-23andme-bankruptcy/744184/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-expose-cisco-meraki-and-ece-products-to-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-expose-cisco-meraki-and-ece-products-to-dos-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/verizon-call-filter-api-flaw-exposed-customers-incoming-call-history/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/verizon-call-filter-api-flaw-exposed-customers-incoming-call-history/</a></p><p><a href="https://thehackernews.com/2025/04/google-patches-quick-share.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/google-patches-quick-share.html</a></p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-23-deals-announced-in-march-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-ma-roundup-23-deals-announced-in-march-2025/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">50f31ded-c139-4520-acd9-41dabacb680d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 03 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b48cc08c-1843-4c18-a7c7-a897da68c70e/KidFlix-On-Dark-Web-Shut-Down-39-Million-Secrets-on-GitHub-Leak.mp3" length="25629438" type="audio/mpeg"/><itunes:duration>17:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>891</itunes:episode><podcast:episode>891</podcast:episode></item><item><title>North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting</title><itunes:title>North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting</itunes:title><description><![CDATA[<p>🎙️ North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 890: Today’s episode will discuss the latest news as North Korean IT Army Expends to Europe more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Sets out Cyber Reporting Requirements</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Gmail end to end Enterprise Encryption</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;24,000 ips behind Palo Alto Scans</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-sets-out-cyber-reporting-requirements-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-sets-out-cyber-reporting-requirements-critical-infrastructure</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-it-worker-army-expands-operations-in-europe/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-it-worker-army-expands-operations-in-europe/</a></p><p><a href="https://www.securityweek.com/chrome-135-firefox-137-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-135-firefox-137-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/</a></p><p><a href="https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/</a></p><p><a href="https://therecord.media/nakasone-interview-china-ai-deepseek-doge" rel="noopener noreferrer" target="_blank">https://therecord.media/nakasone-interview-china-ai-deepseek-doge</a></p><p><a href="https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html</a></p><p><a href="https://www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html</a></p><p><a href="https://www.securityweek.com/security-operations-firm-reliaquest-raises-500m-at-3-4b-valuation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-operations-firm-reliaquest-raises-500m-at-3-4b-valuation/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 890: Today’s episode will discuss the latest news as North Korean IT Army Expends to Europe more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Sets out Cyber Reporting Requirements</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Gmail end to end Enterprise Encryption</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;24,000 ips behind Palo Alto Scans</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-sets-out-cyber-reporting-requirements-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-sets-out-cyber-reporting-requirements-critical-infrastructure</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-it-worker-army-expands-operations-in-europe/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-it-worker-army-expands-operations-in-europe/</a></p><p><a href="https://www.securityweek.com/chrome-135-firefox-137-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-135-firefox-137-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/</a></p><p><a href="https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/</a></p><p><a href="https://therecord.media/nakasone-interview-china-ai-deepseek-doge" rel="noopener noreferrer" target="_blank">https://therecord.media/nakasone-interview-china-ai-deepseek-doge</a></p><p><a href="https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html</a></p><p><a href="https://www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/</a></p><p><a href="https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html</a></p><p><a href="https://www.securityweek.com/security-operations-firm-reliaquest-raises-500m-at-3-4b-valuation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/security-operations-firm-reliaquest-raises-500m-at-3-4b-valuation/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">becb3ce0-08f8-48ce-a7e9-1b75ccfe7eb5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 02 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f7235d6b-3753-409a-ab81-768eb98362c1/North-Korean-IT-Army-Expends-to-Europe-Nakasone-Points-to-China.mp3" length="24660818" type="audio/mpeg"/><itunes:duration>17:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>890</itunes:episode><podcast:episode>890</podcast:episode></item><item><title>Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack</title><itunes:title>Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack</itunes:title><description><![CDATA[<p>🎙️ Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 889: Today’s episode will discuss the latest news as Moscow subway disruption ensue more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Security Expert Disappears</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Ivanti Zeroday Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Hackers Adopt ClickFix Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/moscow-subway-system-disruption-ukraine-hack-message" rel="noopener noreferrer" target="_blank">https://therecord.media/moscow-subway-system-disruption-ukraine-hack-message</a></p><p><a href="https://www.securityweek.com/check-point-responds-to-hacking-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/check-point-responds-to-hacking-claims/</a></p><p><a href="https://www.securityweek.com/hacker-leaks-samsung-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-leaks-samsung-customer-data/</a></p><p><a href="https://thecyberexpress.com/xiaofeng-wang-disappears-after-fbi-raids/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/xiaofeng-wang-disappears-after-fbi-raids/</a></p><p><a href="https://www.securityweek.com/hackers-attempting-to-exploit-crushftp-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-attempting-to-exploit-crushftp-vulnerability/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/</a></p><p><a href="https://therecord.media/canadian-hacker-arrested-texas-gop" rel="noopener noreferrer" target="_blank">https://therecord.media/canadian-hacker-arrested-texas-gop</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks/</a></p><p><a href="https://therecord.media/french-anticompetitive-fine-ad-tracking" rel="noopener noreferrer" target="_blank">https://therecord.media/french-anticompetitive-fine-ad-tracking</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 889: Today’s episode will discuss the latest news as Moscow subway disruption ensue more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Security Expert Disappears</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CISA Warns of Ivanti Zeroday Malware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Hackers Adopt ClickFix Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/moscow-subway-system-disruption-ukraine-hack-message" rel="noopener noreferrer" target="_blank">https://therecord.media/moscow-subway-system-disruption-ukraine-hack-message</a></p><p><a href="https://www.securityweek.com/check-point-responds-to-hacking-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/check-point-responds-to-hacking-claims/</a></p><p><a href="https://www.securityweek.com/hacker-leaks-samsung-customer-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-leaks-samsung-customer-data/</a></p><p><a href="https://thecyberexpress.com/xiaofeng-wang-disappears-after-fbi-raids/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/xiaofeng-wang-disappears-after-fbi-raids/</a></p><p><a href="https://www.securityweek.com/hackers-attempting-to-exploit-crushftp-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-attempting-to-exploit-crushftp-vulnerability/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/</a></p><p><a href="https://therecord.media/canadian-hacker-arrested-texas-gop" rel="noopener noreferrer" target="_blank">https://therecord.media/canadian-hacker-arrested-texas-gop</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks/</a></p><p><a href="https://therecord.media/french-anticompetitive-fine-ad-tracking" rel="noopener noreferrer" target="_blank">https://therecord.media/french-anticompetitive-fine-ad-tracking</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">10dc9cc9-c728-4365-adcb-7a93bf7dfa64</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 01 Apr 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b5af8849-4d5b-4e22-9131-4c1f540a53ca/Moscow-Subway-Disruption-CheckPoint-Hack-Samsung-Customer-Data-.mp3" length="30375365" type="audio/mpeg"/><itunes:duration>21:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>889</itunes:episode><podcast:episode>889</podcast:episode></item><item><title>Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches</title><itunes:title>Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches</itunes:title><description><![CDATA[<p>🎙️ Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 888: Today’s episode will discuss the latest news as Sams Club Breach Claims more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FireFox Flaw Similar to Chrome Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$82M seized in Crypto</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Online Safety Act Clash</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/</a></p><p><a href="https://thecyberexpress.com/massive-uae-cyberattack-blocked/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/massive-uae-cyberattack-blocked/</a></p><p><a href="https://www.securityweek.com/more-solar-system-vulnerabilities-expose-power-grids-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/more-solar-system-vulnerabilities-expose-power-grids-to-hacking/</a></p><p><a href="https://www.securityweek.com/firefox-affected-by-flaw-similar-to-chrome-zero-day-exploited-in-russia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/firefox-affected-by-flaw-similar-to-chrome-zero-day-exploited-in-russia/</a></p><p><a href="https://www.securityweek.com/splunk-patches-dozens-of-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/splunk-patches-dozens-of-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-seized-82-million-in-crypto-linked-to-romance-baiting-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/us-seized-82-million-in-crypto-linked-to-romance-baiting-scams/</a></p><p><a href="https://www.securityweek.com/russian-espionage-group-using-ransomware-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-espionage-group-using-ransomware-in-attacks/</a></p><p><a href="https://therecord.media/uk-online-safety-act-us-social-media-jd-vance" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-online-safety-act-us-social-media-jd-vance</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 888: Today’s episode will discuss the latest news as Sams Club Breach Claims more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FireFox Flaw Similar to Chrome Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$82M seized in Crypto</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;UK Online Safety Act Clash</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/</a></p><p><a href="https://thecyberexpress.com/massive-uae-cyberattack-blocked/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/massive-uae-cyberattack-blocked/</a></p><p><a href="https://www.securityweek.com/more-solar-system-vulnerabilities-expose-power-grids-to-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/more-solar-system-vulnerabilities-expose-power-grids-to-hacking/</a></p><p><a href="https://www.securityweek.com/firefox-affected-by-flaw-similar-to-chrome-zero-day-exploited-in-russia/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/firefox-affected-by-flaw-similar-to-chrome-zero-day-exploited-in-russia/</a></p><p><a href="https://www.securityweek.com/splunk-patches-dozens-of-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/splunk-patches-dozens-of-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-seized-82-million-in-crypto-linked-to-romance-baiting-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/us-seized-82-million-in-crypto-linked-to-romance-baiting-scams/</a></p><p><a href="https://www.securityweek.com/russian-espionage-group-using-ransomware-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-espionage-group-using-ransomware-in-attacks/</a></p><p><a href="https://therecord.media/uk-online-safety-act-us-social-media-jd-vance" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-online-safety-act-us-social-media-jd-vance</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9a996560-066c-477d-b9da-61a079fc3146</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 31 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/632cfbec-d507-452c-a654-bd697931496c/Sams-Club-Breach-Claims-Oracle-Health-Breach-Solar-Systems-Expo.mp3" length="28987322" type="audio/mpeg"/><itunes:duration>20:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>888</itunes:episode><podcast:episode>888</podcast:episode></item><item><title>Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware</title><itunes:title>Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware</itunes:title><description><![CDATA[<p>🎙️ Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 887: Today’s episode will discuss the latest news as Oracle Customer Confirms Data Stolen in Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Streamelements third party breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$1M Loss in Cyber Intrusion &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Bug Bounty &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/</a></p><p><a href="https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices" rel="noopener noreferrer" target="_blank">https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/south-african-poultry-company-1m-loss-cyber-intrusion" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/south-african-poultry-company-1m-loss-cyber-intrusion</a></p><p><a href="https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html</a></p><p><a href="https://www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/</a></p><p><a href="https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 887: Today’s episode will discuss the latest news as Oracle Customer Confirms Data Stolen in Breach with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Streamelements third party breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$1M Loss in Cyber Intrusion &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Bug Bounty &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/</a></p><p><a href="https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices" rel="noopener noreferrer" target="_blank">https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/south-african-poultry-company-1m-loss-cyber-intrusion" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/south-african-poultry-company-1m-loss-cyber-intrusion</a></p><p><a href="https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html</a></p><p><a href="https://www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/</a></p><p><a href="https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6156bac5-4992-47cf-8dc4-8927beb61ee5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 27 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d4a67138-7e11-4aa6-a70a-a86e6d29901a/Oracle-Customer-Confirms-Data-Stolen-in-Breach-Supply-Chain-Bre.mp3" length="26312175" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>887</itunes:episode><podcast:episode>887</podcast:episode></item><item><title>Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware</title><itunes:title>Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware</itunes:title><description><![CDATA[<p>🎙️ Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 886: Today’s episode will discuss the latest news as Google Chrome Sandbox Zeroday with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CrushFTP Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VMware Patches Authentication Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Shift to Ransomware Tactics</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/encrypthub-linked-to-zero-day-attacks-targeting-windows-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/encrypthub-linked-to-zero-day-attacks-targeting-windows-systems/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-unauthenticated-access-flaw-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-unauthenticated-access-flaw-immediately/</a></p><p><a href="https://www.securityweek.com/vmware-patches-authentication-bypass-flaw-in-windows-tools-suite/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-authentication-bypass-flaw-in-windows-tools-suite/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/browser-in-the-browser-attacks-target-cs2-players-steam-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/browser-in-the-browser-attacks-target-cs2-players-steam-accounts/</a></p><p><a href="https://therecord.media/malaysia-pm-says-country-rejected-ransom-demand-airport-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/malaysia-pm-says-country-rejected-ransom-demand-airport-cyberattack</a></p><p><a href="https://www.securityweek.com/ransomware-shifts-tactics-as-payouts-drop-critical-infrastructure-in-the-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-shifts-tactics-as-payouts-drop-critical-infrastructure-in-the-crosshairs/</a></p><p><a href="https://therecord.media/katherine-sutton-nominee-assistant-secretary-defense-cyber-policy" rel="noopener noreferrer" target="_blank">https://therecord.media/katherine-sutton-nominee-assistant-secretary-defense-cyber-policy</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 886: Today’s episode will discuss the latest news as Google Chrome Sandbox Zeroday with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CrushFTP Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;VMware Patches Authentication Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Shift to Ransomware Tactics</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/encrypthub-linked-to-zero-day-attacks-targeting-windows-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/encrypthub-linked-to-zero-day-attacks-targeting-windows-systems/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-unauthenticated-access-flaw-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-unauthenticated-access-flaw-immediately/</a></p><p><a href="https://www.securityweek.com/vmware-patches-authentication-bypass-flaw-in-windows-tools-suite/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-authentication-bypass-flaw-in-windows-tools-suite/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/browser-in-the-browser-attacks-target-cs2-players-steam-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/browser-in-the-browser-attacks-target-cs2-players-steam-accounts/</a></p><p><a href="https://therecord.media/malaysia-pm-says-country-rejected-ransom-demand-airport-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/malaysia-pm-says-country-rejected-ransom-demand-airport-cyberattack</a></p><p><a href="https://www.securityweek.com/ransomware-shifts-tactics-as-payouts-drop-critical-infrastructure-in-the-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-shifts-tactics-as-payouts-drop-critical-infrastructure-in-the-crosshairs/</a></p><p><a href="https://therecord.media/katherine-sutton-nominee-assistant-secretary-defense-cyber-policy" rel="noopener noreferrer" target="_blank">https://therecord.media/katherine-sutton-nominee-assistant-secretary-defense-cyber-policy</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">aac8d967-7e29-4955-b055-65046e0754ee</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 26 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/92a56f78-5ea7-4abc-a8cc-ea693205905e/Google-Chrome-Sandbox-Zeroday-EncryptHub-Linked-to-ZeroDay-on-W.mp3" length="22069053" type="audio/mpeg"/><itunes:duration>15:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>886</itunes:episode><podcast:episode>886</podcast:episode></item><item><title>Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack</title><itunes:title>Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack</itunes:title><description><![CDATA[<p>🎙️ Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 885: Today’s episode will discuss the latest news as Banned Chinese Telecom Still In operations with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ant Hackers Spied on Telecom</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Starlink and scam centers &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ingress Nginx Flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/fcc-probes-whether-banned-chinese-telecom-providers-still-operating-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fcc-probes-whether-banned-chinese-telecom-providers-still-operating-in-us/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/23andme-files-for-bankruptcy-customers-advised-to-delete-dna-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/23andme-files-for-bankruptcy-customers-advised-to-delete-dna-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/</a></p><p><a href="https://therecord.media/thai-officers-intercept-starlink-transmitters-myanmar-cyber-scam-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/thai-officers-intercept-starlink-transmitters-myanmar-cyber-scam-compounds</a></p><p><a href="https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/</a></p><p><a href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 885: Today’s episode will discuss the latest news as Banned Chinese Telecom Still In operations with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ant Hackers Spied on Telecom</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Starlink and scam centers &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ingress Nginx Flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/fcc-probes-whether-banned-chinese-telecom-providers-still-operating-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fcc-probes-whether-banned-chinese-telecom-providers-still-operating-in-us/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/23andme-files-for-bankruptcy-customers-advised-to-delete-dna-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/23andme-files-for-bankruptcy-customers-advised-to-delete-dna-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/</a></p><p><a href="https://therecord.media/thai-officers-intercept-starlink-transmitters-myanmar-cyber-scam-compounds" rel="noopener noreferrer" target="_blank">https://therecord.media/thai-officers-intercept-starlink-transmitters-myanmar-cyber-scam-compounds</a></p><p><a href="https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/critical-ingress-nginx-controller.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/</a></p><p><a href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ecb01d81-109f-41b8-91d5-1b351e916b86</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 25 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3d85e410-4b9a-4fd8-89b5-762a305089d6/Banned-Chinese-Telecom-Still-In-operations-23andme-Files-Bankru.mp3" length="23648312" type="audio/mpeg"/><itunes:duration>16:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>885</itunes:episode><podcast:episode>885</podcast:episode></item><item><title>Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now</title><itunes:title>Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now</itunes:title><description><![CDATA[<p>🎙️ Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 884: Today’s episode will discuss the latest news as Cybersecurity Policy Reform with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Root Cause of GitHub Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Medusa Ransomware EDR Killer &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CERT-UA Darkcrystal RAT</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/</a></p><p><a href="https://www.securityweek.com/impact-root-cause-of-github-actions-supply-chain-hack-revealed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/impact-root-cause-of-github-actions-supply-chain-hack-revealed/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-was-primary-target-of-recent-github-actions-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-was-primary-target-of-recent-github-actions-breaches/</a></p><p><a href="https://www.cybersecuritydive.com/news/medusa-ransomware-malicious-driver-edr-killer/743181/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/medusa-ransomware-malicious-driver-edr-killer/743181/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/</a></p><p><a href="https://thecyberexpress.com/cert-ua-warns-of-darkcrystal-rat/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cert-ua-warns-of-darkcrystal-rat/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/america-cybersecurity-policy-need-reforms-56ada544?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/america-cybersecurity-policy-need-reforms-56ada544?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement" rel="noopener noreferrer" target="_blank">https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 884: Today’s episode will discuss the latest news as Cybersecurity Policy Reform with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Root Cause of GitHub Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Medusa Ransomware EDR Killer &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CERT-UA Darkcrystal RAT</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/</a></p><p><a href="https://www.securityweek.com/impact-root-cause-of-github-actions-supply-chain-hack-revealed/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/impact-root-cause-of-github-actions-supply-chain-hack-revealed/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/coinbase-was-primary-target-of-recent-github-actions-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/coinbase-was-primary-target-of-recent-github-actions-breaches/</a></p><p><a href="https://www.cybersecuritydive.com/news/medusa-ransomware-malicious-driver-edr-killer/743181/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/medusa-ransomware-malicious-driver-edr-killer/743181/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/</a></p><p><a href="https://thecyberexpress.com/cert-ua-warns-of-darkcrystal-rat/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cert-ua-warns-of-darkcrystal-rat/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/america-cybersecurity-policy-need-reforms-56ada544?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/america-cybersecurity-policy-need-reforms-56ada544?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement" rel="noopener noreferrer" target="_blank">https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d13ef920-8735-420e-b258-e658d9b3f31f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 24 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7e364d07-5c1e-4a46-8d55-5a4be2e30b8a/Cybersecurity-Policy-Reform-Coinbase-Target-of-Supply-Chain-Att.mp3" length="30876289" type="audio/mpeg"/><itunes:duration>21:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>884</itunes:episode><podcast:episode>884</podcast:episode></item><item><title>Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay</title><itunes:title>Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay</itunes:title><description><![CDATA[<p>&nbsp;Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 883: Today’s episode will discuss the latest news as Corporate Spying Highlights Insider Threat Risks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pennsylvania Education Union Data Breach &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Black Basta Chat Proves Nation State Affiliation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PHP Flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/</a></p><p><a href="https://www.wsj.com/tech/he-nerded-out-over-payroll-technology-now-hes-accused-of-corporate-spying-e6c5c89a?mod=tech_more_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/he-nerded-out-over-payroll-technology-now-hes-accused-of-corporate-spying-e6c5c89a?mod=tech_more_article_pos1</a></p><p><a href="https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/</a></p><p><a href="https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html</a></p><p><a href="https://www.securityweek.com/scareware-combined-with-phishing-in-attacks-targeting-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/scareware-combined-with-phishing-in-attacks-targeting-macos-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/</a></p><p><a href="https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>&nbsp;Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 883: Today’s episode will discuss the latest news as Corporate Spying Highlights Insider Threat Risks with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pennsylvania Education Union Data Breach &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Black Basta Chat Proves Nation State Affiliation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PHP Flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/</a></p><p><a href="https://www.wsj.com/tech/he-nerded-out-over-payroll-technology-now-hes-accused-of-corporate-spying-e6c5c89a?mod=tech_more_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/he-nerded-out-over-payroll-technology-now-hes-accused-of-corporate-spying-e6c5c89a?mod=tech_more_article_pos1</a></p><p><a href="https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/</a></p><p><a href="https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html</a></p><p><a href="https://www.securityweek.com/scareware-combined-with-phishing-in-attacks-targeting-macos-users/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/scareware-combined-with-phishing-in-attacks-targeting-macos-users/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/</a></p><p><a href="https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">83a6003f-883e-422b-8c77-6721e0d5d7c7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 20 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c2c73241-cd65-49c9-b5f4-8514ad9b0bdb/Corporate-Spying-Highlights-Insider-Threat-Risks-Ukraine-Target.mp3" length="26167979" type="audio/mpeg"/><itunes:duration>18:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>883</itunes:episode><podcast:episode>883</podcast:episode></item><item><title>AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches</title><itunes:title>AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches</itunes:title><description><![CDATA[<p>🎙️ AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 882: Today’s episode will discuss the latest news as AI is Turbocharging Cyber Crime with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;State Attackers Exploit &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Actions Lead to Hack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Municipalities Struggle with Cyber attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-to-acquire-cloud-security-giant-wiz-for-32-billion-in-cash/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-to-acquire-cloud-security-giant-wiz-for-32-billion-in-cash/</a></p><p><a href="https://www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/</a></p><p><a href="https://therecord.media/china-taiwan-hacks-identify-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/china-taiwan-hacks-identify-cyber</a></p><p><a href="https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html</a></p><p><a href="https://www.securityweek.com/11-state-sponsored-apts-exploiting-lnk-files-for-espionage-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/11-state-sponsored-apts-exploiting-lnk-files-for-espionage-data-theft/</a></p><p><a href="https://therecord.media/municipalities-struggling-cyberattacks-services" rel="noopener noreferrer" target="_blank">https://therecord.media/municipalities-struggling-cyberattacks-services</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 882: Today’s episode will discuss the latest news as AI is Turbocharging Cyber Crime with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;State Attackers Exploit &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GitHub Actions Lead to Hack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Municipalities Struggle with Cyber attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/google-to-acquire-cloud-security-giant-wiz-for-32-billion-in-cash/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-to-acquire-cloud-security-giant-wiz-for-32-billion-in-cash/</a></p><p><a href="https://www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/</a></p><p><a href="https://therecord.media/china-taiwan-hacks-identify-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/china-taiwan-hacks-identify-cyber</a></p><p><a href="https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html</a></p><p><a href="https://www.securityweek.com/11-state-sponsored-apts-exploiting-lnk-files-for-espionage-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/11-state-sponsored-apts-exploiting-lnk-files-for-espionage-data-theft/</a></p><p><a href="https://therecord.media/municipalities-struggling-cyberattacks-services" rel="noopener noreferrer" target="_blank">https://therecord.media/municipalities-struggling-cyberattacks-services</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">42ce666e-b986-4815-8f47-bcbbf3b28f54</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 19 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/09bfeb8a-61b7-4712-ba2a-fb37f0feb0d8/AI-is-Turbocharging-Cyber-Crime-Wiz-Scores-32B-from-Google-Chin.mp3" length="28718366" type="audio/mpeg"/><itunes:duration>19:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>882</itunes:episode><podcast:episode>882</podcast:episode></item><item><title>Telegram CEO Durov Leaves France, LockBit &amp; Blackbasta Ransomware News, Github OAuth Hijack</title><itunes:title>Telegram CEO Durov Leaves France, LockBit &amp; Blackbasta Ransomware News, Github OAuth Hijack</itunes:title><description><![CDATA[<p>🎙️ Telegram CEO Durov Leaves France, LockBit &amp; Blackbasta Ransomware News, Github OAuth Hijack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 881: Today’s episode will discuss the latest news as Telegram CEO Durov Leaves France with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploit Code For Apache Tomcat</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Joe Sullivan Sentence Upheld</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Infosys Settles Class Action Lawsuit</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/</a></p><p><a href="https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit" rel="noopener noreferrer" target="_blank">https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit</a></p><p><a href="https://www.cybersecuritydive.com/news/black-basta-uses-brute-forcing-tool-to-attack-edge-devices/742672/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/black-basta-uses-brute-forcing-tool-to-attack-edge-devices/742672/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</a></p><p><a href="https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/</a></p><p><a href="https://therecord.media/telegram-pavel-durov-leaves-france-amid-probe" rel="noopener noreferrer" target="_blank">https://therecord.media/telegram-pavel-durov-leaves-france-amid-probe</a></p><p><a href="https://therecord.media/joe-sullivan-former-uber-executive-conviction-upheld" rel="noopener noreferrer" target="_blank">https://therecord.media/joe-sullivan-former-uber-executive-conviction-upheld</a></p><p><a href="https://www.bankinfosecurity.com/infosys-settles-data-breach-class-action-lawsuits-for-175m-a-27746" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/infosys-settles-data-breach-class-action-lawsuits-for-175m-a-27746</a></p><p><a href="https://www.securityweek.com/nist-announces-hqc-as-fifth-standardized-post-quantum-algorithm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-announces-hqc-as-fifth-standardized-post-quantum-algorithm/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Telegram CEO Durov Leaves France, LockBit &amp; Blackbasta Ransomware News, Github OAuth Hijack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 881: Today’s episode will discuss the latest news as Telegram CEO Durov Leaves France with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exploit Code For Apache Tomcat</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Joe Sullivan Sentence Upheld</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Infosys Settles Class Action Lawsuit</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/</a></p><p><a href="https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit" rel="noopener noreferrer" target="_blank">https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit</a></p><p><a href="https://www.cybersecuritydive.com/news/black-basta-uses-brute-forcing-tool-to-attack-edge-devices/742672/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/black-basta-uses-brute-forcing-tool-to-attack-edge-devices/742672/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</a></p><p><a href="https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/</a></p><p><a href="https://therecord.media/telegram-pavel-durov-leaves-france-amid-probe" rel="noopener noreferrer" target="_blank">https://therecord.media/telegram-pavel-durov-leaves-france-amid-probe</a></p><p><a href="https://therecord.media/joe-sullivan-former-uber-executive-conviction-upheld" rel="noopener noreferrer" target="_blank">https://therecord.media/joe-sullivan-former-uber-executive-conviction-upheld</a></p><p><a href="https://www.bankinfosecurity.com/infosys-settles-data-breach-class-action-lawsuits-for-175m-a-27746" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/infosys-settles-data-breach-class-action-lawsuits-for-175m-a-27746</a></p><p><a href="https://www.securityweek.com/nist-announces-hqc-as-fifth-standardized-post-quantum-algorithm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-announces-hqc-as-fifth-standardized-post-quantum-algorithm/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">02527f3e-3224-48f3-9ec0-a88fc3396a63</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 18 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/46e2fe98-4a7e-45a6-8248-b82ed4c4da58/Telegram-CEO-Durov-Leaves-France-LockBit-Blackbasta-Ransomware-.mp3" length="26322833" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>881</itunes:episode><podcast:episode>881</podcast:episode></item><item><title>Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware</title><itunes:title>Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware</itunes:title><description><![CDATA[<p>🎙️ Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 880: Today’s episode will discuss the latest news as Nvidia Riva Vulnerability Abuse AI Services with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Booking Phishing Malware Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;100 Car Dealerships Hit by Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FCC National Security Council</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/100-car-dealerships-hit-by-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/100-car-dealerships-hit-by-supply-chain-attack/</a></p><p><a href="https://therecord.media/europe-increased-cyber-espionage-telecoms-denmark-report" rel="noopener noreferrer" target="_blank">https://therecord.media/europe-increased-cyber-espionage-telecoms-denmark-report</a></p><p><a href="https://www.cybersecuritydive.com/news/superblack-ransomware-used-to-exploit-fortinet-vulnerabilities/742578/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/superblack-ransomware-used-to-exploit-fortinet-vulnerabilities/742578/</a></p><p><a href="https://www.securityweek.com/nvidia-riva-vulnerabilities-allow-unauthorized-use-of-ai-services/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-riva-vulnerabilities-allow-unauthorized-use-of-ai-services/</a></p><p><a href="https://www.securityweek.com/popular-github-action-targeted-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/popular-github-action-targeted-in-supply-chain-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/</a></p><p><a href="https://therecord.media/booking-phishing-hotels-malware-campaign" rel="noopener noreferrer" target="_blank">https://therecord.media/booking-phishing-hotels-malware-campaign</a></p><p><a href="https://therecord.media/google-refuses-to-deny-it-received-uk-tcn" rel="noopener noreferrer" target="_blank">https://therecord.media/google-refuses-to-deny-it-received-uk-tcn</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-national-security-council/742440/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-national-security-council/742440/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 880: Today’s episode will discuss the latest news as Nvidia Riva Vulnerability Abuse AI Services with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Booking Phishing Malware Campaign</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;100 Car Dealerships Hit by Supply Chain Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FCC National Security Council</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/100-car-dealerships-hit-by-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/100-car-dealerships-hit-by-supply-chain-attack/</a></p><p><a href="https://therecord.media/europe-increased-cyber-espionage-telecoms-denmark-report" rel="noopener noreferrer" target="_blank">https://therecord.media/europe-increased-cyber-espionage-telecoms-denmark-report</a></p><p><a href="https://www.cybersecuritydive.com/news/superblack-ransomware-used-to-exploit-fortinet-vulnerabilities/742578/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/superblack-ransomware-used-to-exploit-fortinet-vulnerabilities/742578/</a></p><p><a href="https://www.securityweek.com/nvidia-riva-vulnerabilities-allow-unauthorized-use-of-ai-services/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-riva-vulnerabilities-allow-unauthorized-use-of-ai-services/</a></p><p><a href="https://www.securityweek.com/popular-github-action-targeted-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/popular-github-action-targeted-in-supply-chain-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/</a></p><p><a href="https://therecord.media/booking-phishing-hotels-malware-campaign" rel="noopener noreferrer" target="_blank">https://therecord.media/booking-phishing-hotels-malware-campaign</a></p><p><a href="https://therecord.media/google-refuses-to-deny-it-received-uk-tcn" rel="noopener noreferrer" target="_blank">https://therecord.media/google-refuses-to-deny-it-received-uk-tcn</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-national-security-council/742440/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-national-security-council/742440/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6e18b34d-c6a4-4e70-ba69-508518968873</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 17 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8f7c9886-53db-46e5-8ddf-4ee1a4892af6/Nvidia-Riva-Vulnerability-GitHub-Supply-Chain-Attack-Telecom-Cy.mp3" length="24248292" type="audio/mpeg"/><itunes:duration>16:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>880</itunes:episode><podcast:episode>880</podcast:episode></item><item><title>China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability</title><itunes:title>China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability</itunes:title><description><![CDATA[<p>🎙️ China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 879: Today’s episode will discuss the latest news as China’s Volt Typhoon in Network for 300 Days with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Medusa Ransomware Targets</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSRF Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;USF Leader in Cybersecurity</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/</a></p><p><a href="https://therecord.media/china-continues-attacks-routers-juniper" rel="noopener noreferrer" target="_blank">https://therecord.media/china-continues-attacks-routers-juniper</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-kernel-zero-day-exploited-since-2023/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-kernel-zero-day-exploited-since-2023/</a></p><p><a href="https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/</a></p><p><a href="https://thecyberexpress.com/multiple-zoom-vulnerabilities-detected/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/multiple-zoom-vulnerabilities-detected/</a></p><p><a href="https://www.wsj.com/articles/university-of-south-florida-gets-40-million-to-start-cyber-and-ai-college-2a257e9a?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/university-of-south-florida-gets-40-million-to-start-cyber-and-ai-college-2a257e9a?mod=cybersecurity_news_article_pos1</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 879: Today’s episode will discuss the latest news as China’s Volt Typhoon in Network for 300 Days with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Medusa Ransomware Targets</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSRF Attacks</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;USF Leader in Cybersecurity</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/</a></p><p><a href="https://therecord.media/china-continues-attacks-routers-juniper" rel="noopener noreferrer" target="_blank">https://therecord.media/china-continues-attacks-routers-juniper</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-kernel-zero-day-exploited-since-2023/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-kernel-zero-day-exploited-since-2023/</a></p><p><a href="https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/</a></p><p><a href="https://thecyberexpress.com/multiple-zoom-vulnerabilities-detected/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/multiple-zoom-vulnerabilities-detected/</a></p><p><a href="https://www.wsj.com/articles/university-of-south-florida-gets-40-million-to-start-cyber-and-ai-college-2a257e9a?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/university-of-south-florida-gets-40-million-to-start-cyber-and-ai-college-2a257e9a?mod=cybersecurity_news_article_pos1</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1b3cd1ab-f4e9-4272-835c-2748d21e4a7b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 13 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/01b57664-c7f0-4a36-9340-8f0b571b6040/China-s-Volt-Typhoon-in-Network-for-300-Days-Chinese-Router-Att.mp3" length="26648214" type="audio/mpeg"/><itunes:duration>18:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>879</itunes:episode><podcast:episode>879</podcast:episode></item><item><title>6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated</title><itunes:title>6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated</itunes:title><description><![CDATA[<p>🎙️ 6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 878: Today’s episode will discuss the latest news as 6 Microsoft Zero days Patch Now with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patch Tuesday Recap</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Lazarus Infects NPM Packages</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New York AG Sues Insurance Giant</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/</a></p><p><a href="https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-commerce-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-commerce-netweaver/</a></p><p><a href="https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-cisa-schneider-electric-siemens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-cisa-schneider-electric-siemens/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/</a></p><p><a href="https://therecord.media/ballista-botnet-tp-link-archer-routers" rel="noopener noreferrer" target="_blank">https://therecord.media/ballista-botnet-tp-link-archer-routers</a></p><p><a href="https://www.securityweek.com/new-york-sues-insurance-giant-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-york-sues-insurance-giant-over-data-breaches/</a></p><p><a href="https://therecord.media/plankey-nominated-to-run-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/plankey-nominated-to-run-cisa</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 878: Today’s episode will discuss the latest news as 6 Microsoft Zero days Patch Now with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Patch Tuesday Recap</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean Lazarus Infects NPM Packages</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;New York AG Sues Insurance Giant</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/</a></p><p><a href="https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-commerce-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-commerce-netweaver/</a></p><p><a href="https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-cisa-schneider-electric-siemens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-cisa-schneider-electric-siemens/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/</a></p><p><a href="https://therecord.media/ballista-botnet-tp-link-archer-routers" rel="noopener noreferrer" target="_blank">https://therecord.media/ballista-botnet-tp-link-archer-routers</a></p><p><a href="https://www.securityweek.com/new-york-sues-insurance-giant-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-york-sues-insurance-giant-over-data-breaches/</a></p><p><a href="https://therecord.media/plankey-nominated-to-run-cisa" rel="noopener noreferrer" target="_blank">https://therecord.media/plankey-nominated-to-run-cisa</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND at <a href="http://www.levelzeroconference.com" rel="noopener noreferrer" target="_blank">www.levelzeroconference.com</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e38ec9a9-7711-43ef-89c7-35e17425a92d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 12 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/171ddad9-ad9b-4b81-a707-26ae8649597b/6-Microsoft-Zero-days-Patch-Now-Patch-Tuesday-Apple-Webkit-Expl.mp3" length="29767861" type="audio/mpeg"/><itunes:duration>20:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>878</itunes:episode><podcast:episode>878</podcast:episode></item><item><title>Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud</title><itunes:title>Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud</itunes:title><description><![CDATA[<p>🎙️ Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 877: Today’s episode will discuss the latest news as Massive Cyberattack on X with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Industrial Attacks due to Scada Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2024 Record year for Fraud</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Paid $12M in Bug Bounties &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/x-hit-by-massive-cyberattack-amid-dark-storms-ddos-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/x-hit-by-massive-cyberattack-amid-dark-storms-ddos-claims/</a></p><p><a href="https://www.securityweek.com/mass-exploitation-of-critical-php-vulnerability-begins/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mass-exploitation-of-critical-php-vulnerability-begins/</a></p><p><a href="https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html</a></p><p><a href="https://www.securityweek.com/details-disclosed-for-scada-flaws-that-could-facilitate-industrial-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/details-disclosed-for-scada-flaws-that-could-facilitate-industrial-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector</a></p><p><a href="https://therecord.media/trump-admin-ends-ftc-ransomware-case" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-admin-ends-ftc-ransomware-case</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-says-americans-lost-record-125-billion-to-fraud-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-govt-says-americans-lost-record-125-billion-to-fraud-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-will-send-255-million-to-victims-of-tech-support-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-will-send-255-million-to-victims-of-tech-support-scams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 877: Today’s episode will discuss the latest news as Massive Cyberattack on X with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Industrial Attacks due to Scada Flaws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2024 Record year for Fraud</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Paid $12M in Bug Bounties &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/x-hit-by-massive-cyberattack-amid-dark-storms-ddos-claims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/x-hit-by-massive-cyberattack-amid-dark-storms-ddos-claims/</a></p><p><a href="https://www.securityweek.com/mass-exploitation-of-critical-php-vulnerability-begins/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/mass-exploitation-of-critical-php-vulnerability-begins/</a></p><p><a href="https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html</a></p><p><a href="https://www.securityweek.com/details-disclosed-for-scada-flaws-that-could-facilitate-industrial-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/details-disclosed-for-scada-flaws-that-could-facilitate-industrial-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector</a></p><p><a href="https://therecord.media/trump-admin-ends-ftc-ransomware-case" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-admin-ends-ftc-ransomware-case</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-says-americans-lost-record-125-billion-to-fraud-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-govt-says-americans-lost-record-125-billion-to-fraud-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-will-send-255-million-to-victims-of-tech-support-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-will-send-255-million-to-victims-of-tech-support-scams/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1bbfa5d6-e1e8-40d9-89a6-63acf5f7cf33</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 11 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/eb5c473a-58d9-4f12-9cec-88e65a8450e1/Massive-Cyberattack-on-X-Exploit-of-PHP-Vulnerability-MGM-Ranso.mp3" length="26611224" type="audio/mpeg"/><itunes:duration>18:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>877</itunes:episode><podcast:episode>877</podcast:episode></item><item><title>NTT Data Breach Impacts 18000 Companies, National Cyber Director Power, Army Soldiers Charged for Treason</title><itunes:title>NTT Data Breach Impacts 18000 Companies, National Cyber Director Power, Army Soldiers Charged for Treason</itunes:title><description><![CDATA[<p>🎙️ NTT Data Breach Impacts 18000 Companies, National Cyber Director Power, Army Soldiers Charged for Treason</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 876: Today’s episode will discuss the latest news as NTT Data Breach Impacts 18000 Companies with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$23 Million in Crypto Recovered</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Edimax Camera Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Unpaid Parking Ticket Phishing</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/</a></p><p><a href="https://www.securityweek.com/edimax-camera-zero-day-disclosed-by-cisa-exploited-by-botnets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/edimax-camera-zero-day-disclosed-by-cisa-exploited-by-botnets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/</a></p><p><a href="https://therecord.media/trump-white-house-office-national-cyber-director" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-white-house-office-national-cyber-director</a></p><p><a href="https://www.cybersecuritydive.com/news/cobalt-strike-takedown-effort-cuts-cracked-versions-by-80/741906/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cobalt-strike-takedown-effort-cuts-cracked-versions-by-80/741906/</a></p><p><a href="https://www.securityweek.com/us-seize-garantex-in-cryptocurrency-money-laundering-bust/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-seize-garantex-in-cryptocurrency-money-laundering-bust/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/</a></p><p><a href="https://therecord.media/two-army-soldiers-charged-selling-secrets-to-china" rel="noopener noreferrer" target="_blank">https://therecord.media/two-army-soldiers-charged-selling-secrets-to-china</a></p><p><a href="https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ NTT Data Breach Impacts 18000 Companies, National Cyber Director Power, Army Soldiers Charged for Treason</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 876: Today’s episode will discuss the latest news as NTT Data Breach Impacts 18000 Companies with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$23 Million in Crypto Recovered</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Edimax Camera Zeroday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Unpaid Parking Ticket Phishing</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/</a></p><p><a href="https://www.securityweek.com/edimax-camera-zero-day-disclosed-by-cisa-exploited-by-botnets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/edimax-camera-zero-day-disclosed-by-cisa-exploited-by-botnets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/</a></p><p><a href="https://therecord.media/trump-white-house-office-national-cyber-director" rel="noopener noreferrer" target="_blank">https://therecord.media/trump-white-house-office-national-cyber-director</a></p><p><a href="https://www.cybersecuritydive.com/news/cobalt-strike-takedown-effort-cuts-cracked-versions-by-80/741906/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cobalt-strike-takedown-effort-cuts-cracked-versions-by-80/741906/</a></p><p><a href="https://www.securityweek.com/us-seize-garantex-in-cryptocurrency-money-laundering-bust/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-seize-garantex-in-cryptocurrency-money-laundering-bust/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/</a></p><p><a href="https://therecord.media/two-army-soldiers-charged-selling-secrets-to-china" rel="noopener noreferrer" target="_blank">https://therecord.media/two-army-soldiers-charged-selling-secrets-to-china</a></p><p><a href="https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/</a></p><p>&nbsp;</p><p>Level Zero Conference Discount Code: L020RESPOND</p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">43cc0c39-dcf8-4ec9-b927-c6beab5393ed</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 10 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/37d61453-be28-4f9f-b97c-9ae04519c6d5/NTT-Data-Breach-Impacts-18000-Companies-National-Cyber-Director.mp3" length="27080175" type="audio/mpeg"/><itunes:duration>18:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>876</itunes:episode><podcast:episode>876</podcast:episode></item><item><title>Treasury Hackers Identified &amp; Indicated, Silk Typhoon New Target, VMware ESXi Exploit Risks Ransomware</title><itunes:title>Treasury Hackers Identified &amp; Indicated, Silk Typhoon New Target, VMware ESXi Exploit Risks Ransomware</itunes:title><description><![CDATA[<p>🎙️ Treasury Hackers Identified &amp; Indicated, Silk Typhoon New Target, VMware ESXi Exploit Risks Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 875: Today’s episode will discuss the latest news as Treasury Hackers Identified &amp; Indicated with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android Malware Botnet</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nigerian Criminal Extradited</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Silk Typhoon Now target IT Supply Chain</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury</a></p><p><a href="https://www.bankinfosecurity.com/us-prosecutors-indict-isoon-chinese-hacking-contractors-a-27650" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-prosecutors-indict-isoon-chinese-hacking-contractors-a-27650</a></p><p><a href="https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/</a></p><p><a href="https://www.securityweek.com/exploited-vmware-esxi-flaws-put-many-at-risk-of-ransomware-other-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vmware-esxi-flaws-put-many-at-risk-of-ransomware-other-attacks/</a></p><p><a href="https://www.bankinfosecurity.com/malware-infested-android-devices-fuel-global-botnet-fraud-a-27654" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/malware-infested-android-devices-fuel-global-botnet-fraud-a-27654</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-signed-driver-used-in-ransomware-attacks/741372/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-signed-driver-used-in-ransomware-attacks/741372/</a></p><p><a href="https://www.securityweek.com/financial-organizations-urge-cisa-to-revise-proposed-circia-implementation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/financial-organizations-urge-cisa-to-revise-proposed-circia-implementation/</a></p><p><a href="https://www.securityweek.com/nigerian-accused-of-hacking-tax-preparation-firms-extradited-to-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nigerian-accused-of-hacking-tax-preparation-firms-extradited-to-us/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Treasury Hackers Identified &amp; Indicated, Silk Typhoon New Target, VMware ESXi Exploit Risks Ransomware</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 875: Today’s episode will discuss the latest news as Treasury Hackers Identified &amp; Indicated with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android Malware Botnet</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nigerian Criminal Extradited</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Silk Typhoon Now target IT Supply Chain</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury" rel="noopener noreferrer" target="_blank">https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury</a></p><p><a href="https://www.bankinfosecurity.com/us-prosecutors-indict-isoon-chinese-hacking-contractors-a-27650" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-prosecutors-indict-isoon-chinese-hacking-contractors-a-27650</a></p><p><a href="https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/</a></p><p><a href="https://www.securityweek.com/exploited-vmware-esxi-flaws-put-many-at-risk-of-ransomware-other-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploited-vmware-esxi-flaws-put-many-at-risk-of-ransomware-other-attacks/</a></p><p><a href="https://www.bankinfosecurity.com/malware-infested-android-devices-fuel-global-botnet-fraud-a-27654" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/malware-infested-android-devices-fuel-global-botnet-fraud-a-27654</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-signed-driver-used-in-ransomware-attacks/741372/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-signed-driver-used-in-ransomware-attacks/741372/</a></p><p><a href="https://www.securityweek.com/financial-organizations-urge-cisa-to-revise-proposed-circia-implementation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/financial-organizations-urge-cisa-to-revise-proposed-circia-implementation/</a></p><p><a href="https://www.securityweek.com/nigerian-accused-of-hacking-tax-preparation-firms-extradited-to-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nigerian-accused-of-hacking-tax-preparation-firms-extradited-to-us/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3eb5d149-7dc7-4cc9-ad3d-90d7c7343e8d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 06 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e8cbc6bb-77a8-48ba-ab43-997bf066784b/Treasury-Hackers-Identified-Indicated-Silk-Typhoon-New-Target-V.mp3" length="25057043" type="audio/mpeg"/><itunes:duration>17:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>875</itunes:episode><podcast:episode>875</podcast:episode></item><item><title>Tata Tech Cyber Attackers Come Forward, Polish Space Agency Cyberattack, Bybit Laundering</title><itunes:title>Tata Tech Cyber Attackers Come Forward, Polish Space Agency Cyberattack, Bybit Laundering</itunes:title><description><![CDATA[<p>🎙️ Tata Tech Cyber Attackers Come Forward, Polish Space Agency Cyberattack, Bybit Laundering</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 874: Today’s episode will discuss the latest news as Tata Tech Cyber Attackers Come Forward with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fake Bianbian Mailer</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ATM Jackpotting</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nemesis Marketplace Halted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-tata-technologies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-tata-technologies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/polish-space-agency-offline-as-it-recovers-from-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/polish-space-agency-offline-as-it-recovers-from-cyberattack/</a></p><p><a href="https://therecord.media/north-koreans-initial-laundering-bybit-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/north-koreans-initial-laundering-bybit-hack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-bianlian-ransom-notes-mailed-to-us-ceos-in-postal-mail-scam/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-bianlian-ransom-notes-mailed-to-us-ceos-in-postal-mail-scam/</a></p><p><a href="https://www.securityweek.com/two-venezuelans-arrested-in-us-for-atm-jackpotting/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-venezuelans-arrested-in-us-for-atm-jackpotting/</a></p><p><a href="https://www.securityweek.com/intel-tdx-connect-bridges-the-cpu-gpu-security-gap/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-tdx-connect-bridges-the-cpu-gpu-security-gap/</a></p><p><a href="https://therecord.media/iran-national-sanctioned-nemesis-marketplace" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-national-sanctioned-nemesis-marketplace</a></p><p><a href="https://www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Tata Tech Cyber Attackers Come Forward, Polish Space Agency Cyberattack, Bybit Laundering</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 874: Today’s episode will discuss the latest news as Tata Tech Cyber Attackers Come Forward with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Fake Bianbian Mailer</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ATM Jackpotting</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Nemesis Marketplace Halted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-tata-technologies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-attack-on-tata-technologies/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/polish-space-agency-offline-as-it-recovers-from-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/polish-space-agency-offline-as-it-recovers-from-cyberattack/</a></p><p><a href="https://therecord.media/north-koreans-initial-laundering-bybit-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/north-koreans-initial-laundering-bybit-hack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-bianlian-ransom-notes-mailed-to-us-ceos-in-postal-mail-scam/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-bianlian-ransom-notes-mailed-to-us-ceos-in-postal-mail-scam/</a></p><p><a href="https://www.securityweek.com/two-venezuelans-arrested-in-us-for-atm-jackpotting/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/two-venezuelans-arrested-in-us-for-atm-jackpotting/</a></p><p><a href="https://www.securityweek.com/intel-tdx-connect-bridges-the-cpu-gpu-security-gap/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-tdx-connect-bridges-the-cpu-gpu-security-gap/</a></p><p><a href="https://therecord.media/iran-national-sanctioned-nemesis-marketplace" rel="noopener noreferrer" target="_blank">https://therecord.media/iran-national-sanctioned-nemesis-marketplace</a></p><p><a href="https://www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">50ddf6b2-30dd-45f5-ac2d-3726450adcdf</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 05 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8bbcaf4d-e4f2-4f5a-a662-0785c17824d0/Tata-Tech-Cyber-Attackers-Come-Forward-Polish-Space-Agency-Cybe.mp3" length="25778023" type="audio/mpeg"/><itunes:duration>17:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>874</itunes:episode><podcast:episode>874</podcast:episode></item><item><title>3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet</title><itunes:title>3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet</itunes:title><description><![CDATA[<p>🎙️ 3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 873: Today’s episode will discuss the latest news as 3 VMware Zero-days Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Targets UAE Aviation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Phantom Debt Collection Scheme</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qualcomm MediaTek Chipsets Patch</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-in-qualcomm-mediatek-chipsets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-in-qualcomm-mediatek-chipsets/</a></p><p><a href="https://therecord.media/russian-telecom-beeline-outages-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-telecom-beeline-outages-cyber</a></p><p><a href="https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint</a></p><p><a href="https://thecyberexpress.com/ftc-halts-phantom-debt-collection-scheme/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ftc-halts-phantom-debt-collection-scheme/</a></p><p><a href="https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/</a></p><p><a href="https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 3 VMware Zero-days Exploited, Rubrik Rotates Keys, Russian Beeline Outage tied to Cyber, Iran Botnet</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 873: Today’s episode will discuss the latest news as 3 VMware Zero-days Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Targets UAE Aviation</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Phantom Debt Collection Scheme</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Qualcomm MediaTek Chipsets Patch</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-patched-in-qualcomm-mediatek-chipsets/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-patched-in-qualcomm-mediatek-chipsets/</a></p><p><a href="https://therecord.media/russian-telecom-beeline-outages-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-telecom-beeline-outages-cyber</a></p><p><a href="https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint</a></p><p><a href="https://thecyberexpress.com/ftc-halts-phantom-debt-collection-scheme/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/ftc-halts-phantom-debt-collection-scheme/</a></p><p><a href="https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/</a></p><p><a href="https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5ced61db-2ff4-4139-9ddf-d75978bc47b2</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 04 Mar 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9147d595-b8b8-4609-a5b5-24e3e6b63874/3-VMware-Zero-days-Exploited-Rubrik-Rotates-Keys-Russian-Beelin.mp3" length="29155342" type="audio/mpeg"/><itunes:duration>20:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>873</itunes:episode><podcast:episode>873</podcast:episode></item><item><title>Philippines Army Hack, Chinese Apt Attacks OT, Android ZeroDay Exploit, Lawsuit on AI Hackers</title><itunes:title>Philippines Army Hack, Chinese Apt Attacks OT, Android ZeroDay Exploit, Lawsuit on AI Hackers</itunes:title><description><![CDATA[<p>🎙️ Philippines Army Hack, Chinese Apt Attacks OT, Android ZeroDay Exploit, Lawsuit on AI Hackers</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 872: Today’s episode will discuss the latest news as Philippines Army Hack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Attackers Come Forward</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Encryption &amp; VPN Laws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Karen Evans Named Executive Assistant Director At CISA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/philippines-army-confirms-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/philippines-army-confirms-hack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/</a></p><p><a href="https://www.darkreading.com/ics-ot-security/chinese-apt-vpn-bug-worldwide-ot-orgs" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/chinese-apt-vpn-bug-worldwide-ot-orgs</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-infrastructure-state-local-cyber/741273/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-infrastructure-state-local-cyber/741273/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/privacy-tech-firms-warn-frances-encryption-and-vpn-laws-threaten-privacy/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/privacy-tech-firms-warn-frances-encryption-and-vpn-laws-threaten-privacy/</a></p><p><a href="https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nearly-12-000-api-keys-and-passwords-found-in-ai-training-dataset/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-12-000-api-keys-and-passwords-found-in-ai-training-dataset/</a></p><p><a href="https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/</a></p><p><a href="https://therecord.media/hacker-arrested-bangkok-data-breaches-extortion" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-arrested-bangkok-data-breaches-extortion</a></p><p><a href="https://thecyberexpress.com/karen-evans-new-executive-assistant-director/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/karen-evans-new-executive-assistant-director/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Philippines Army Hack, Chinese Apt Attacks OT, Android ZeroDay Exploit, Lawsuit on AI Hackers</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 872: Today’s episode will discuss the latest news as Philippines Army Hack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lee Enterprises Attackers Come Forward</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;France Encryption &amp; VPN Laws</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Karen Evans Named Executive Assistant Director At CISA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/philippines-army-confirms-hack" rel="noopener noreferrer" target="_blank">https://therecord.media/philippines-army-confirms-hack</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/</a></p><p><a href="https://www.darkreading.com/ics-ot-security/chinese-apt-vpn-bug-worldwide-ot-orgs" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/chinese-apt-vpn-bug-worldwide-ot-orgs</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-infrastructure-state-local-cyber/741273/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-infrastructure-state-local-cyber/741273/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/privacy-tech-firms-warn-frances-encryption-and-vpn-laws-threaten-privacy/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/privacy-tech-firms-warn-frances-encryption-and-vpn-laws-threaten-privacy/</a></p><p><a href="https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nearly-12-000-api-keys-and-passwords-found-in-ai-training-dataset/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nearly-12-000-api-keys-and-passwords-found-in-ai-training-dataset/</a></p><p><a href="https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/</a></p><p><a href="https://therecord.media/hacker-arrested-bangkok-data-breaches-extortion" rel="noopener noreferrer" target="_blank">https://therecord.media/hacker-arrested-bangkok-data-breaches-extortion</a></p><p><a href="https://thecyberexpress.com/karen-evans-new-executive-assistant-director/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/karen-evans-new-executive-assistant-director/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a1a021c6-5320-4349-9efd-79b16e4de44e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 03 Mar 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e138839b-6587-40a1-816a-4de871f580ba/Philippines-Army-Hack-Chinese-Apt-Attacks-OT-Android-ZeroDay-Ex.mp3" length="25990555" type="audio/mpeg"/><itunes:duration>18:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>872</itunes:episode><podcast:episode>872</podcast:episode></item><item><title>Cyberattacks Halts Cleveland Municipal Court, Gabbard Concerns over UK Apple Backdoor, Encrypthub Breaches 618 orgs</title><itunes:title>Cyberattacks Halts Cleveland Municipal Court, Gabbard Concerns over UK Apple Backdoor, Encrypthub Breaches 618 orgs</itunes:title><description><![CDATA[<p>🎙️ Cyberattacks Halts Cleveland Municipal Court, Gabbard Concerns over UK Apple Backdoor, Encrypthub Breaches 618 orgs</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 871: Today’s episode will discuss the latest news as Cyberattacks Halts Cleveland Municipal Court with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FBI Blames ByBit to North Korea</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Arkansas Sues GM</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Anubis Ransomware Raise</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyber-incident-shuts-down-cleveland-municipal-court" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incident-shuts-down-cleveland-municipal-court</a></p><p><a href="https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/</a></p><p><a href="https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern" rel="noopener noreferrer" target="_blank">https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern</a></p><p><a href="https://therecord.media/arkansas-sues-gm-over-data-collection-sharing" rel="noopener noreferrer" target="_blank">https://therecord.media/arkansas-sues-gm-over-data-collection-sharing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/</a></p><p><a href="https://www.securityweek.com/new-ransomware-anubis-could-pose-major-threat-to-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-ransomware-anubis-could-pose-major-threat-to-organizations/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vscode-extensions-with-9-million-installs-pulled-over-security-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vscode-extensions-with-9-million-installs-pulled-over-security-risks/</a></p><p><a href="https://www.securityweek.com/openssf-releases-security-baseline-for-open-source-projects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openssf-releases-security-baseline-for-open-source-projects/</a></p><p><a href="https://www.cybersecuritydive.com/news/nearly-3k-ivanti-connect-secure-instances-vulnerable-to-critical-flaw/740994/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nearly-3k-ivanti-connect-secure-instances-vulnerable-to-critical-flaw/740994/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Cyberattacks Halts Cleveland Municipal Court, Gabbard Concerns over UK Apple Backdoor, Encrypthub Breaches 618 orgs</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 871: Today’s episode will discuss the latest news as Cyberattacks Halts Cleveland Municipal Court with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;FBI Blames ByBit to North Korea</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Arkansas Sues GM</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Anubis Ransomware Raise</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyber-incident-shuts-down-cleveland-municipal-court" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incident-shuts-down-cleveland-municipal-court</a></p><p><a href="https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/</a></p><p><a href="https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern" rel="noopener noreferrer" target="_blank">https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern</a></p><p><a href="https://therecord.media/arkansas-sues-gm-over-data-collection-sharing" rel="noopener noreferrer" target="_blank">https://therecord.media/arkansas-sues-gm-over-data-collection-sharing</a></p><p><a href="https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/</a></p><p><a href="https://www.securityweek.com/new-ransomware-anubis-could-pose-major-threat-to-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-ransomware-anubis-could-pose-major-threat-to-organizations/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vscode-extensions-with-9-million-installs-pulled-over-security-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vscode-extensions-with-9-million-installs-pulled-over-security-risks/</a></p><p><a href="https://www.securityweek.com/openssf-releases-security-baseline-for-open-source-projects/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openssf-releases-security-baseline-for-open-source-projects/</a></p><p><a href="https://www.cybersecuritydive.com/news/nearly-3k-ivanti-connect-secure-instances-vulnerable-to-critical-flaw/740994/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/nearly-3k-ivanti-connect-secure-instances-vulnerable-to-critical-flaw/740994/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">37d6ef8b-aee8-4132-b889-cb63845ab5cc</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 27 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1004723-9d20-4a73-9448-d74d9d0d522a/Cyberattacks-Halts-Cleveland-Municipal-Court-Gabbard-Concerns-o.mp3" length="25883349" type="audio/mpeg"/><itunes:duration>17:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>871</itunes:episode><podcast:episode>871</podcast:episode></item><item><title>NSA Secret Sex Chats, DISA Data Breach, Sweden Seeks Backdoor to Messaging Apps, Linux Backdoor</title><itunes:title>NSA Secret Sex Chats, DISA Data Breach, Sweden Seeks Backdoor to Messaging Apps, Linux Backdoor</itunes:title><description><![CDATA[<p>🎙️ NSA Secret Sex Chats, DISA Data Breach, Sweden Seeks Backdoor to Messaging Apps, Linux Backdoor</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 870: Today’s episode will discuss the latest news as NSA Secret Sex Chats with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;KEV Catalog Adds Microsoft &amp; Zimbra</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Tricksters Spin up Deekseek websites</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;284M Accounts Stolen by infostealer</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/3-3-million-people-impacted-by-disa-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/3-3-million-people-impacted-by-disa-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/</a></p><p><a href="https://therecord.media/sweden-seeks-backdoor-access-to-messaging-apps" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-seeks-backdoor-access-to-messaging-apps</a></p><p><a href="https://www.bankinfosecurity.com/ransomware-recovery-lessons-learned-from-arnold-clark-a-27593" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ransomware-recovery-lessons-learned-from-arnold-clark-a-27593</a></p><p><a href="https://christopherrufo.com/p/the-nsas-secret-sex-chats" rel="noopener noreferrer" target="_blank">https://christopherrufo.com/p/the-nsas-secret-sex-chats</a></p><p><a href="https://www.bankinfosecurity.com/australia-fines-telegram-for-delays-in-violent-content-probe-a-27598" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australia-fines-telegram-for-delays-in-violent-content-probe-a-27598</a></p><p><a href="https://www.darkreading.com/threat-intelligence/ai-tricksters-spin-up-fake-deepseek-sites-steal-crypto" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/ai-tricksters-spin-up-fake-deepseek-sites-steal-crypto</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/</a></p><p><a href="https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html</a></p><p><a href="https://www.securityweek.com/skybox-security-shuts-down-lays-off-entire-workforce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/skybox-security-shuts-down-lays-off-entire-workforce/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ NSA Secret Sex Chats, DISA Data Breach, Sweden Seeks Backdoor to Messaging Apps, Linux Backdoor</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 870: Today’s episode will discuss the latest news as NSA Secret Sex Chats with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;KEV Catalog Adds Microsoft &amp; Zimbra</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Tricksters Spin up Deekseek websites</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;284M Accounts Stolen by infostealer</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/3-3-million-people-impacted-by-disa-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/3-3-million-people-impacted-by-disa-data-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/</a></p><p><a href="https://therecord.media/sweden-seeks-backdoor-access-to-messaging-apps" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-seeks-backdoor-access-to-messaging-apps</a></p><p><a href="https://www.bankinfosecurity.com/ransomware-recovery-lessons-learned-from-arnold-clark-a-27593" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ransomware-recovery-lessons-learned-from-arnold-clark-a-27593</a></p><p><a href="https://christopherrufo.com/p/the-nsas-secret-sex-chats" rel="noopener noreferrer" target="_blank">https://christopherrufo.com/p/the-nsas-secret-sex-chats</a></p><p><a href="https://www.bankinfosecurity.com/australia-fines-telegram-for-delays-in-violent-content-probe-a-27598" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/australia-fines-telegram-for-delays-in-violent-content-probe-a-27598</a></p><p><a href="https://www.darkreading.com/threat-intelligence/ai-tricksters-spin-up-fake-deepseek-sites-steal-crypto" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/ai-tricksters-spin-up-fake-deepseek-sites-steal-crypto</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/</a></p><p><a href="https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html</a></p><p><a href="https://www.securityweek.com/skybox-security-shuts-down-lays-off-entire-workforce/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/skybox-security-shuts-down-lays-off-entire-workforce/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">eff599d8-fbc0-432a-aa4a-81b4c1cb7e2f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 26 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/df7d678b-b2ef-49cb-928d-fac8a64b7875/NSA-Secret-Sex-Chats-DISA-Data-Breach-Sweden-Seeks-Backdoor-to-.mp3" length="29642473" type="audio/mpeg"/><itunes:duration>20:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>870</itunes:episode><podcast:episode>870</podcast:episode></item><item><title>Bybit Crypto Heist Tied to North Korea, Orange Romania Hacked, Cyber sweatshops, ICS Risks Surge</title><itunes:title>Bybit Crypto Heist Tied to North Korea, Orange Romania Hacked, Cyber sweatshops, ICS Risks Surge</itunes:title><description><![CDATA[<p>🎙️ Bybit Crypto Heist Tied to North Korea, Orange Romania Hacked, Cyber sweatshops, ICS Risks Surge</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 869: Today’s episode will discuss the latest news as Bybit Crypto Heist Tied to North Korea with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oracle Agile PLM Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Botnet Targets Microsoft 365</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Bans Chinese &amp; North Korean Projects</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/1-5-billion-bybit-heist-linked-to-north-korean-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1-5-billion-bybit-heist-linked-to-north-korean-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/</a></p><p><a href="https://www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-attacks-exploiting-oracle-agile-plm-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-attacks-exploiting-oracle-agile-plm-vulnerability/</a></p><p><a href="https://www.darkreading.com/cyber-risk/industrial-system-cyberattacks-surge-ot-vulnerable" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/industrial-system-cyberattacks-surge-ot-vulnerable</a></p><p><a href="https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/</a></p><p><a href="https://www.securityweek.com/openai-bans-chatgpt-accounts-used-by-chinese-group-for-spy-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-bans-chatgpt-accounts-used-by-chinese-group-for-spy-tools/</a></p><p><a href="https://therecord.media/hegseth-cyber-command-2-0-review-authorities-wish-list" rel="noopener noreferrer" target="_blank">https://therecord.media/hegseth-cyber-command-2-0-review-authorities-wish-list</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Bybit Crypto Heist Tied to North Korea, Orange Romania Hacked, Cyber sweatshops, ICS Risks Surge</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 869: Today’s episode will discuss the latest news as Bybit Crypto Heist Tied to North Korea with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Oracle Agile PLM Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Botnet Targets Microsoft 365</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenAI Bans Chinese &amp; North Korean Projects</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/1-5-billion-bybit-heist-linked-to-north-korean-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1-5-billion-bybit-heist-linked-to-north-korean-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/</a></p><p><a href="https://www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/thailand-cyber-sweatshops-free-captives</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-attacks-exploiting-oracle-agile-plm-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-attacks-exploiting-oracle-agile-plm-vulnerability/</a></p><p><a href="https://www.darkreading.com/cyber-risk/industrial-system-cyberattacks-surge-ot-vulnerable" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/industrial-system-cyberattacks-surge-ot-vulnerable</a></p><p><a href="https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/</a></p><p><a href="https://www.securityweek.com/openai-bans-chatgpt-accounts-used-by-chinese-group-for-spy-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-bans-chatgpt-accounts-used-by-chinese-group-for-spy-tools/</a></p><p><a href="https://therecord.media/hegseth-cyber-command-2-0-review-authorities-wish-list" rel="noopener noreferrer" target="_blank">https://therecord.media/hegseth-cyber-command-2-0-review-authorities-wish-list</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">0ca78e28-8ebe-42c2-8ce3-7d3fd6b98d23</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 25 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/180cf68a-d4ea-4999-b122-88195c26ca7d/Bybit-Crypto-Heist-Tied-to-North-Korea-Orange-Romania-Hacked-Cy.mp3" length="27352266" type="audio/mpeg"/><itunes:duration>18:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>869</itunes:episode><podcast:episode>869</podcast:episode></item><item><title>ByBit Hacked for $1.5 Billion in Crypto, Apple Folds to UK Privacy Request, Salt Typhoon Details, Black Basta Goes Dark</title><itunes:title>ByBit Hacked for $1.5 Billion in Crypto, Apple Folds to UK Privacy Request, Salt Typhoon Details, Black Basta Goes Dark</itunes:title><description><![CDATA[<p>🎙️ ByBit Hacked for $1.5 Billion in Crypto, Apple Folds to UK Privacy Request, Salt Typhoon Details, Black Basta Goes Dark</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 868: Today’s episode will discuss the latest news as ByBit Hacked for $1.5 Billion in Crypto with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Abuses Developers in Fake Jobs Ads</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Another Palo Alto Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Pins Attacks in NSA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/bybit-hack-drains-1-5-billion-from-cryptocurrency-exchange/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bybit-hack-drains-1-5-billion-from-cryptocurrency-exchange/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-pulls-icloud-end-to-end-encryption-feature-in-the-uk/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-pulls-icloud-end-to-end-encryption-feature-in-the-uk/</a></p><p><a href="https://www.securityweek.com/cisco-details-salt-typhoon-network-hopping-credential-theft-tactics/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-details-salt-typhoon-network-hopping-credential-theft-tactics/</a></p><p><a href="https://www.securityweek.com/how-china-pinned-university-cyberattacks-on-nsa-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/how-china-pinned-university-cyberattacks-on-nsa-hackers/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/black-basta-goes-dark-infighting-chat-leaks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/black-basta-goes-dark-infighting-chat-leaks</a></p><p><a href="https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/</a></p><p><a href="https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/</a></p><p><a href="https://www.darkreading.com/cyber-risk/nations-data-embassies-protect-critical-info" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/nations-data-embassies-protect-critical-info</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-cso-shawn-henry-retire/740703/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-cso-shawn-henry-retire/740703/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ ByBit Hacked for $1.5 Billion in Crypto, Apple Folds to UK Privacy Request, Salt Typhoon Details, Black Basta Goes Dark</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 868: Today’s episode will discuss the latest news as ByBit Hacked for $1.5 Billion in Crypto with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Abuses Developers in Fake Jobs Ads</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Another Palo Alto Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Pins Attacks in NSA</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/bybit-hack-drains-1-5-billion-from-cryptocurrency-exchange/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bybit-hack-drains-1-5-billion-from-cryptocurrency-exchange/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-pulls-icloud-end-to-end-encryption-feature-in-the-uk/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-pulls-icloud-end-to-end-encryption-feature-in-the-uk/</a></p><p><a href="https://www.securityweek.com/cisco-details-salt-typhoon-network-hopping-credential-theft-tactics/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-details-salt-typhoon-network-hopping-credential-theft-tactics/</a></p><p><a href="https://www.securityweek.com/how-china-pinned-university-cyberattacks-on-nsa-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/how-china-pinned-university-cyberattacks-on-nsa-hackers/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/black-basta-goes-dark-infighting-chat-leaks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/black-basta-goes-dark-infighting-chat-leaks</a></p><p><a href="https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/</a></p><p><a href="https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/</a></p><p><a href="https://www.darkreading.com/cyber-risk/nations-data-embassies-protect-critical-info" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/nations-data-embassies-protect-critical-info</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-cso-shawn-henry-retire/740703/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-cso-shawn-henry-retire/740703/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f60b7308-8733-4c77-99be-0c2a6261563e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 24 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1965caf7-e7fb-426a-b992-9908bf19d671/ByBit-Hacked-for-1-5-Billion-in-Crypto-Apple-Folds-to-UK-Privac.mp3" length="29139669" type="audio/mpeg"/><itunes:duration>20:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>868</itunes:episode><podcast:episode>868</podcast:episode></item><item><title>Palo Alto Networks Firewall Bug Exploited, Power Pages Patch, Ivanti EPM Exploit, New DoD CISO</title><itunes:title>Palo Alto Networks Firewall Bug Exploited, Power Pages Patch, Ivanti EPM Exploit, New DoD CISO</itunes:title><description><![CDATA[<p>🎙️ Palo Alto Networks Firewall Bug Exploited, Power Pages Patch, Ivanti EPM Exploit, New DoD CISO</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 867: Today’s episode will discuss the latest news as Palo Alto Networks Firewall Bug Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Katie Arrington Returns to the Pentagon</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ghost Ransomware in over 70 countries &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenSSH Patches MiTM DoS Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-exploited-power-pages-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-exploited-power-pages-vulnerability/</a></p><p><a href="https://www.securityweek.com/poc-exploit-published-for-critical-ivanti-epm-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/poc-exploit-published-for-critical-ivanti-epm-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/openssh-patches-vulnerabilities-allowing-mitm-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openssh-patches-vulnerabilities-allowing-mitm-dos-attacks/</a></p><p><a href="https://thecyberexpress.com/cve-2024-12284-security-update/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2024-12284-security-update/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/</a></p><p><a href="https://www.darkreading.com/ics-ot-security/australian-critical-infrastructure-acute-foreign-threats" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/australian-critical-infrastructure-acute-foreign-threats</a></p><p><a href="https://www.bankinfosecurity.com/katie-arrington-returns-to-pentagon-as-dod-ciso-a-27558" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/katie-arrington-returns-to-pentagon-as-dod-ciso-a-27558</a></p><p><a href="https://www.wsj.com/world/middle-east/hamas-turns-handover-of-dead-hostages-into-a-spectacle-d6049540?mod=hp_lead_pos8" rel="noopener noreferrer" target="_blank">https://www.wsj.com/world/middle-east/hamas-turns-handover-of-dead-hostages-into-a-spectacle-d6049540?mod=hp_lead_pos8</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Palo Alto Networks Firewall Bug Exploited, Power Pages Patch, Ivanti EPM Exploit, New DoD CISO</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 867: Today’s episode will discuss the latest news as Palo Alto Networks Firewall Bug Exploited with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Katie Arrington Returns to the Pentagon</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ghost Ransomware in over 70 countries &nbsp;&nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenSSH Patches MiTM DoS Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-exploited-power-pages-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-exploited-power-pages-vulnerability/</a></p><p><a href="https://www.securityweek.com/poc-exploit-published-for-critical-ivanti-epm-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/poc-exploit-published-for-critical-ivanti-epm-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/openssh-patches-vulnerabilities-allowing-mitm-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openssh-patches-vulnerabilities-allowing-mitm-dos-attacks/</a></p><p><a href="https://thecyberexpress.com/cve-2024-12284-security-update/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2024-12284-security-update/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/</a></p><p><a href="https://www.darkreading.com/ics-ot-security/australian-critical-infrastructure-acute-foreign-threats" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/australian-critical-infrastructure-acute-foreign-threats</a></p><p><a href="https://www.bankinfosecurity.com/katie-arrington-returns-to-pentagon-as-dod-ciso-a-27558" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/katie-arrington-returns-to-pentagon-as-dod-ciso-a-27558</a></p><p><a href="https://www.wsj.com/world/middle-east/hamas-turns-handover-of-dead-hostages-into-a-spectacle-d6049540?mod=hp_lead_pos8" rel="noopener noreferrer" target="_blank">https://www.wsj.com/world/middle-east/hamas-turns-handover-of-dead-hostages-into-a-spectacle-d6049540?mod=hp_lead_pos8</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a5a1a90f-840a-473d-a28d-a64ce562563f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 20 Feb 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b8b19d43-6720-4c29-ad3f-244640530a7d/Palo-Alto-Networks-Firewall-Bug-Exploited-Power-Pages-Patch-Iva.mp3" length="32782183" type="audio/mpeg"/><itunes:duration>22:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>867</itunes:episode><podcast:episode>867</podcast:episode></item><item><title>Lee Enterprises Ransomware Disruption, Insight Partners Cyberattack, HNFS Settles DoD Suit, China</title><itunes:title>Lee Enterprises Ransomware Disruption, Insight Partners Cyberattack, HNFS Settles DoD Suit, China</itunes:title><description><![CDATA[<p>🎙️ Lee Enterprises Ransomware Disruption, Insight Partners Cyberattack, HNFS Settles DoD Suit, China &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 866: Today’s episode will discuss the latest news as Lee Enterprises Ransomware Disruption with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Abuse App V tool</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Phishing Campaign &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimusky Attacks Rival Platform</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/lee-enterprises-newspaper-disruptions-caused-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lee-enterprises-newspaper-disruptions-caused-by-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/venture-capital-giant-insight-partners-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/venture-capital-giant-insight-partners-hit-by-cyberattack/</a></p><p><a href="https://www.securityweek.com/finastra-starts-notifying-people-impacted-by-recent-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/finastra-starts-notifying-people-impacted-by-recent-data-breach/</a></p><p><a href="https://thecyberexpress.com/hnfs-settles-cybersecurity-case/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hnfs-settles-cybersecurity-case/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-microsoft-app-v-tool-to-evade-antivirus/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-microsoft-app-v-tool-to-evade-antivirus/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/</a></p><p><a href="https://www.securityweek.com/golang-backdoor-abuses-telegram-for-cc-communication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/golang-backdoor-abuses-telegram-for-cc-communication/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/north-koreans-kimsuky-attacks-rivals-trusted-platforms" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/north-koreans-kimsuky-attacks-rivals-trusted-platforms</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Lee Enterprises Ransomware Disruption, Insight Partners Cyberattack, HNFS Settles DoD Suit, China &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 866: Today’s episode will discuss the latest news as Lee Enterprises Ransomware Disruption with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Abuse App V tool</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Phishing Campaign &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Kimusky Attacks Rival Platform</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/lee-enterprises-newspaper-disruptions-caused-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lee-enterprises-newspaper-disruptions-caused-by-ransomware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/venture-capital-giant-insight-partners-hit-by-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/venture-capital-giant-insight-partners-hit-by-cyberattack/</a></p><p><a href="https://www.securityweek.com/finastra-starts-notifying-people-impacted-by-recent-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/finastra-starts-notifying-people-impacted-by-recent-data-breach/</a></p><p><a href="https://thecyberexpress.com/hnfs-settles-cybersecurity-case/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/hnfs-settles-cybersecurity-case/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-microsoft-app-v-tool-to-evade-antivirus/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-abuse-microsoft-app-v-tool-to-evade-antivirus/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/</a></p><p><a href="https://www.securityweek.com/golang-backdoor-abuses-telegram-for-cc-communication/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/golang-backdoor-abuses-telegram-for-cc-communication/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/north-koreans-kimsuky-attacks-rivals-trusted-platforms" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/north-koreans-kimsuky-attacks-rivals-trusted-platforms</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5ddea2f7-f9ec-43cb-b072-7f39acac0dce</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 19 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/86fb6fe3-bae3-48cb-9114-3397bfdfe968/Lee-Enterprises-Ransomware-Disruption-Insight-Partners-Cyberatt.mp3" length="29767861" type="audio/mpeg"/><itunes:duration>20:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>866</itunes:episode><podcast:episode>866</podcast:episode></item><item><title>PostgresSQL Zeroday Exploit, South Korea Suspends Deepseek AI, $577M Crypto Fraud, 23andme Troubles</title><itunes:title>PostgresSQL Zeroday Exploit, South Korea Suspends Deepseek AI, $577M Crypto Fraud, 23andme Troubles</itunes:title><description><![CDATA[<p>🎙️ PostgresSQL Zeroday Exploit, South Korea Suspends Deepseek AI, $577M Crypto Fraud, 23andme Troubles &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 865: Today’s episode will discuss the latest news as PostgresSQL Zeroday Exploit with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android 16 Blocks Scams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Xerox Printer Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;XCSSET MacOS Malware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/</a></p><p><a href="https://www.wsj.com/tech/biotech/23andme-to-cut-workforce-by-40-discontinues-therapeutics-pipeline-8c818729?mod=tech_feat3_biotech_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/biotech/23andme-to-cut-workforce-by-40-discontinues-therapeutics-pipeline-8c818729?mod=tech_feat3_biotech_pos4</a></p><p><a href="https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html</a></p><p><a href="https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/</a></p><p><a href="https://www.securityweek.com/xerox-versalink-printer-vulnerabilities-enable-lateral-movement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/xerox-versalink-printer-vulnerabilities-enable-lateral-movement/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/</a></p><p><a href="https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html</a></p><p><a href="https://www.darkreading.com/cyber-risk/warning-tunnel-of-love-leads-to-scams" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/warning-tunnel-of-love-leads-to-scams</a></p><p><a href="https://thecyberexpress.com/android-16-blocks-scammers/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/android-16-blocks-scammers/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ PostgresSQL Zeroday Exploit, South Korea Suspends Deepseek AI, $577M Crypto Fraud, 23andme Troubles &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Ep – 865: Today’s episode will discuss the latest news as PostgresSQL Zeroday Exploit with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Android 16 Blocks Scams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Xerox Printer Vulnerabilities</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;XCSSET MacOS Malware</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/</a></p><p><a href="https://www.wsj.com/tech/biotech/23andme-to-cut-workforce-by-40-discontinues-therapeutics-pipeline-8c818729?mod=tech_feat3_biotech_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/biotech/23andme-to-cut-workforce-by-40-discontinues-therapeutics-pipeline-8c818729?mod=tech_feat3_biotech_pos4</a></p><p><a href="https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html</a></p><p><a href="https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/</a></p><p><a href="https://www.securityweek.com/xerox-versalink-printer-vulnerabilities-enable-lateral-movement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/xerox-versalink-printer-vulnerabilities-enable-lateral-movement/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/</a></p><p><a href="https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html</a></p><p><a href="https://www.darkreading.com/cyber-risk/warning-tunnel-of-love-leads-to-scams" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/warning-tunnel-of-love-leads-to-scams</a></p><p><a href="https://thecyberexpress.com/android-16-blocks-scammers/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/android-16-blocks-scammers/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">58a9f5e0-07ed-47b1-9751-e231eb0c09c7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 18 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/efdca7ed-8c3a-46f4-a4ce-322850a2f46c/PostgresSQL-Zeroday-Exploit-South-Korea-Suspends-Deepseek-AI-57.mp3" length="27748491" type="audio/mpeg"/><itunes:duration>19:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>865</itunes:episode><podcast:episode>865</podcast:episode></item><item><title>Salt Typhoon Goes Global, Windows Zero Day, Virginia AG Cyberattack, Device Code Phishing Used by Russian Attackers</title><itunes:title>Salt Typhoon Goes Global, Windows Zero Day, Virginia AG Cyberattack, Device Code Phishing Used by Russian Attackers</itunes:title><description><![CDATA[<p>🎙️ Salt Typhoon Goes Global, Windows Zero Day, Virginia AG Cyberattack, Device Code Phishing Used by Russian Attackers &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Salt Typhoon Goes Global with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SailPoint IPO</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Investigates DeepSeek</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Finaldraft Malware Abuses Outlook</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoon-exploits-cisco-devices-telco-infrastructure" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoon-exploits-cisco-devices-telco-infrastructure</a></p><p><a href="https://www.securityweek.com/new-windows-zero-day-exploited-by-chinese-apt-security-firm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-windows-zero-day-exploited-by-chinese-apt-security-firm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/</a></p><p><a href="https://www.securityweek.com/virginia-attorney-generals-office-struck-by-cyberattack-targeting-attorneys-computer-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/virginia-attorney-generals-office-struck-by-cyberattack-targeting-attorneys-computer-systems/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/</a></p><p><a href="https://www.securityweek.com/russian-state-hackers-target-organizations-with-device-code-phishing/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-state-hackers-target-organizations-with-device-code-phishing/</a></p><p><a href="https://therecord.media/texas-investigating-deepseek-privacy" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-investigating-deepseek-privacy</a></p><p><a href="https://www.securityweek.com/sailpoint-ipo-signals-bright-spot-for-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sailpoint-ipo-signals-bright-spot-for-cybersecurity/</a></p><p><a href="https://www.darkreading.com/identity-access-management-security/cyberark-makes-identity-security-play-zilla-acquisition" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/identity-access-management-security/cyberark-makes-identity-security-play-zilla-acquisition</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Salt Typhoon Goes Global, Windows Zero Day, Virginia AG Cyberattack, Device Code Phishing Used by Russian Attackers &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Salt Typhoon Goes Global with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SailPoint IPO</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas Investigates DeepSeek</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Finaldraft Malware Abuses Outlook</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoon-exploits-cisco-devices-telco-infrastructure" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoon-exploits-cisco-devices-telco-infrastructure</a></p><p><a href="https://www.securityweek.com/new-windows-zero-day-exploited-by-chinese-apt-security-firm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-windows-zero-day-exploited-by-chinese-apt-security-firm/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/</a></p><p><a href="https://www.securityweek.com/virginia-attorney-generals-office-struck-by-cyberattack-targeting-attorneys-computer-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/virginia-attorney-generals-office-struck-by-cyberattack-targeting-attorneys-computer-systems/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/</a></p><p><a href="https://www.securityweek.com/russian-state-hackers-target-organizations-with-device-code-phishing/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-state-hackers-target-organizations-with-device-code-phishing/</a></p><p><a href="https://therecord.media/texas-investigating-deepseek-privacy" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-investigating-deepseek-privacy</a></p><p><a href="https://www.securityweek.com/sailpoint-ipo-signals-bright-spot-for-cybersecurity/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sailpoint-ipo-signals-bright-spot-for-cybersecurity/</a></p><p><a href="https://www.darkreading.com/identity-access-management-security/cyberark-makes-identity-security-play-zilla-acquisition" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/identity-access-management-security/cyberark-makes-identity-security-play-zilla-acquisition</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4dde2bfd-99f0-4dbc-ae9c-526151c42959</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 17 Feb 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f65adb45-f2eb-4ca4-b4be-e3b3a2dd0122/Salt-Typhoon-Goes-Global-Windows-Zero-Day-Virginia-AG-Cyberatta.mp3" length="24114127" type="audio/mpeg"/><itunes:duration>16:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>864</itunes:episode><podcast:episode>864</podcast:episode></item><item><title>Russian Seashell Blizzard Targets Critical Infrastructure, Zklend Crypto Heist, Cyber crime Threats Evolve</title><itunes:title>Russian Seashell Blizzard Targets Critical Infrastructure, Zklend Crypto Heist, Cyber crime Threats Evolve</itunes:title><description><![CDATA[<p>🎙️ Russian Seashell Blizzard Targets Critical Infrastructure, Zklend Crypto Heist, Cyber crime Threats Evolve &nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Russian Seashell Blizzard Targets Critical Infrastructure and all the patches with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Japan Active Cyber Defense</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Palo Alto Networks Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Trump Appoints Cyber Director</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/zklend-loses-95m-in-crypto-heist-asks-hacker-to-return-90-percent/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/zklend-loses-95m-in-crypto-heist-asks-hacker-to-return-90-percent/</a></p><p><a href="https://therecord.media/cybercrime-evolving-nation-state-threat" rel="noopener noreferrer" target="_blank">https://therecord.media/cybercrime-evolving-nation-state-threat</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sarcoma-ransomware-claims-breach-at-giant-pcb-maker-unimicron/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sarcoma-ransomware-claims-breach-at-giant-pcb-maker-unimicron/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/japan-offense-new-cyber-defense-bill" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/japan-offense-new-cyber-defense-bill</a></p><p><a href="https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-potentially-serious-firewall-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-potentially-serious-firewall-vulnerability/</a></p><p><a href="https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-nominate-cairncross-cyber-director/739940/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-nominate-cairncross-cyber-director/739940/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Russian Seashell Blizzard Targets Critical Infrastructure, Zklend Crypto Heist, Cyber crime Threats Evolve &nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Russian Seashell Blizzard Targets Critical Infrastructure and all the patches with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Japan Active Cyber Defense</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Palo Alto Networks Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Trump Appoints Cyber Director</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/zklend-loses-95m-in-crypto-heist-asks-hacker-to-return-90-percent/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/cryptocurrency/zklend-loses-95m-in-crypto-heist-asks-hacker-to-return-90-percent/</a></p><p><a href="https://therecord.media/cybercrime-evolving-nation-state-threat" rel="noopener noreferrer" target="_blank">https://therecord.media/cybercrime-evolving-nation-state-threat</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sarcoma-ransomware-claims-breach-at-giant-pcb-maker-unimicron/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sarcoma-ransomware-claims-breach-at-giant-pcb-maker-unimicron/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/japan-offense-new-cyber-defense-bill" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/japan-offense-new-cyber-defense-bill</a></p><p><a href="https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-potentially-serious-firewall-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-potentially-serious-firewall-vulnerability/</a></p><p><a href="https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/trump-nominate-cairncross-cyber-director/739940/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/trump-nominate-cairncross-cyber-director/739940/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">17ca5592-79dc-4db5-930f-cba1c2385eb4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 13 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b9804c55-00c0-4f27-a47c-f22d4ed3e41e/Russian-Seashell-Blizzard-Targets-Critical-Infrastructure-Zklen.mp3" length="28651910" type="audio/mpeg"/><itunes:duration>19:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>863</itunes:episode><podcast:episode>863</podcast:episode></item><item><title>Breaking Down Patch Tuesday from Microsoft, Adobe, Intel &amp; More, Sonicwall Exploit, India’s Cybercrime Problem</title><itunes:title>Breaking Down Patch Tuesday from Microsoft, Adobe, Intel &amp; More, Sonicwall Exploit, India’s Cybercrime Problem</itunes:title><description><![CDATA[<p>🎙️ Breaking Down Patch Tuesday from Microsoft, Adobe, Intel &amp; More, Sonicwall Exploit, India’s Cybercrime Problem &nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Breaking down patch Tuesday and all the patches with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenSSL Vulnerability Found</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean IT Pawn Pleads Guilty</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-wormable-windows-flaw-and-file-deleting-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-wormable-windows-flaw-and-file-deleting-zero-day/</a></p><p><a href="https://www.securityweek.com/adobe-plugs-45-software-security-holes-warn-of-code-execution-risks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-plugs-45-software-security-holes-warn-of-code-execution-risks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/</a></p><p><a href="https://www.securityweek.com/intel-patched-374-vulnerabilities-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-patched-374-vulnerabilities-in-2024/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-schneider-electric-siemens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-schneider-electric-siemens/</a></p><p><a href="https://www.securityweek.com/sap-releases-21-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-releases-21-security-patches/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/</a></p><p><a href="https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/</a></p><p><a href="https://www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes</a></p><p><a href="https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm" rel="noopener noreferrer" target="_blank">https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Breaking Down Patch Tuesday from Microsoft, Adobe, Intel &amp; More, Sonicwall Exploit, India’s Cybercrime Problem &nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Breaking down patch Tuesday and all the patches with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ICS Patch Tuesday</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;OpenSSL Vulnerability Found</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korean IT Pawn Pleads Guilty</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/microsoft-patches-wormable-windows-flaw-and-file-deleting-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-wormable-windows-flaw-and-file-deleting-zero-day/</a></p><p><a href="https://www.securityweek.com/adobe-plugs-45-software-security-holes-warn-of-code-execution-risks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-plugs-45-software-security-holes-warn-of-code-execution-risks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/</a></p><p><a href="https://www.securityweek.com/intel-patched-374-vulnerabilities-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/intel-patched-374-vulnerabilities-in-2024/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-schneider-electric-siemens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-schneider-electric-siemens/</a></p><p><a href="https://www.securityweek.com/sap-releases-21-security-patches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-releases-21-security-patches/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/</a></p><p><a href="https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/</a></p><p><a href="https://www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes</a></p><p><a href="https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm" rel="noopener noreferrer" target="_blank">https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">84d665f9-2fef-4f59-89a9-bff49777a841</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 12 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c859347a-feb6-46a2-858c-ec48fca213d9/Breaking-Down-Patch-Tuesday-from-Microsoft-Adobe-Intel-More-Son.mp3" length="24616305" type="audio/mpeg"/><itunes:duration>17:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>862</itunes:episode><podcast:episode>862</podcast:episode></item><item><title>Apple Confirms USB Exploit, Newspaper Printing Cyberattack, OpenAI Rejects Breach Claims, Bug Bounty</title><itunes:title>Apple Confirms USB Exploit, Newspaper Printing Cyberattack, OpenAI Rejects Breach Claims, Bug Bounty</itunes:title><description><![CDATA[<p>🎙️ Apple Confirms USB Exploit, Newspaper Printing Cyberattack, OpenAI Rejects Breach Claims, Bug Bounty &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Apple Confirms USB Exploit with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Tag Manager Exploit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Warrior Fast Track</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;8Base Ransomware Taken Down &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/</a></p><p><a href="https://therecord.media/lee-enterprises-cyberattack-newspapers-priinting" rel="noopener noreferrer" target="_blank">https://therecord.media/lee-enterprises-cyberattack-newspapers-priinting</a></p><p><a href="https://www.securityweek.com/openai-finds-no-evidence-of-breach-after-hacker-offers-to-sell-20m-credentials/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-finds-no-evidence-of-breach-after-hacker-offers-to-sell-20m-credentials/</a></p><p><a href="https://therecord.media/8base-ransomware-site-taken-down-4-arrested" rel="noopener noreferrer" target="_blank">https://therecord.media/8base-ransomware-site-taken-down-4-arrested</a></p><p><a href="https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/</a></p><p><a href="https://therecord.media/british-military-drops-basic-training-to-fast-track-cyber-recruits" rel="noopener noreferrer" target="_blank">https://therecord.media/british-military-drops-basic-training-to-fast-track-cyber-recruits</a></p><p><a href="https://www.securityweek.com/microsoft-expands-copilot-bug-bounty-program-increases-payouts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-expands-copilot-bug-bounty-program-increases-payouts/</a></p><p><a href="https://www.securityweek.com/indiana-man-sentenced-to-20-years-in-prison-for-hacking-37-million-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/indiana-man-sentenced-to-20-years-in-prison-for-hacking-37-million-crypto-theft/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Apple Confirms USB Exploit, Newspaper Printing Cyberattack, OpenAI Rejects Breach Claims, Bug Bounty &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Apple Confirms USB Exploit with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Tag Manager Exploit</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cyber Warrior Fast Track</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;8Base Ransomware Taken Down &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/</a></p><p><a href="https://therecord.media/lee-enterprises-cyberattack-newspapers-priinting" rel="noopener noreferrer" target="_blank">https://therecord.media/lee-enterprises-cyberattack-newspapers-priinting</a></p><p><a href="https://www.securityweek.com/openai-finds-no-evidence-of-breach-after-hacker-offers-to-sell-20m-credentials/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-finds-no-evidence-of-breach-after-hacker-offers-to-sell-20m-credentials/</a></p><p><a href="https://therecord.media/8base-ransomware-site-taken-down-4-arrested" rel="noopener noreferrer" target="_blank">https://therecord.media/8base-ransomware-site-taken-down-4-arrested</a></p><p><a href="https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/</a></p><p><a href="https://therecord.media/british-military-drops-basic-training-to-fast-track-cyber-recruits" rel="noopener noreferrer" target="_blank">https://therecord.media/british-military-drops-basic-training-to-fast-track-cyber-recruits</a></p><p><a href="https://www.securityweek.com/microsoft-expands-copilot-bug-bounty-program-increases-payouts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-expands-copilot-bug-bounty-program-increases-payouts/</a></p><p><a href="https://www.securityweek.com/indiana-man-sentenced-to-20-years-in-prison-for-hacking-37-million-crypto-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/indiana-man-sentenced-to-20-years-in-prison-for-hacking-37-million-crypto-theft/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">971f90f3-32b6-4647-9ccf-b847ffe5c59a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 11 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/53a11bf8-3daa-4f6a-9c97-95c62ab87689/Apple-Confirms-USB-Exploit-Newspaper-Printing-Cyberattack-OpenA.mp3" length="23808181" type="audio/mpeg"/><itunes:duration>16:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>861</itunes:episode><podcast:episode>861</podcast:episode></item><item><title>UK Government Demands Apple iCloud Backdoor, Deepseek Bans Raise, Avery Ransomware, HPE Breach</title><itunes:title>UK Government Demands Apple iCloud Backdoor, Deepseek Bans Raise, Avery Ransomware, HPE Breach</itunes:title><description><![CDATA[<p>🎙️ UK Government Demands Apple iCloud Backdoor, Deepseek Bans Raise, Avery Ransomware, HPE Breach &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as UK Government Demands Apple iCloud Backdoor with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Brute Force Attack on VPN</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Fake Interview</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Trimble Warns of Zero Day &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-government-reportedly-demands-backdoor-apple-icloud" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-reportedly-demands-backdoor-apple-icloud</a></p><p><a href="https://www.bankinfosecurity.com/asian-governments-rush-to-ban-deepseek-over-privacy-concerns-a-27476" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/asian-governments-rush-to-ban-deepseek-over-privacy-concerns-a-27476</a></p><p><a href="https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html</a></p><p><a href="https://www.securityweek.com/trimble-cityworks-customers-warned-of-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trimble-cityworks-customers-warned-of-zero-day-exploitation/</a></p><p><a href="https://therecord.media/avery-products-ransomware-data-breach-notification" rel="noopener noreferrer" target="_blank">https://therecord.media/avery-products-ransomware-data-breach-notification</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-notifies-employees-of-data-breach-after-russian-office-365-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-notifies-employees-of-data-breach-after-russian-office-365-hack/</a></p><p><a href="https://www.securityweek.com/information-of-883000-stolen-in-crippling-attack-on-hospital-sisters-health-system/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/information-of-883000-stolen-in-crippling-attack-on-hospital-sisters-health-system/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/</a></p><p><a href="https://www.securityweek.com/1000-apps-used-in-malicious-campaign-targeting-android-users-in-india/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1000-apps-used-in-malicious-campaign-targeting-android-users-in-india/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korean-hackers--fake-interview/739165/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korean-hackers--fake-interview/739165/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UK Government Demands Apple iCloud Backdoor, Deepseek Bans Raise, Avery Ransomware, HPE Breach &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as UK Government Demands Apple iCloud Backdoor with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Massive Brute Force Attack on VPN</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;North Korea Fake Interview</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Trimble Warns of Zero Day &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/uk-government-reportedly-demands-backdoor-apple-icloud" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-government-reportedly-demands-backdoor-apple-icloud</a></p><p><a href="https://www.bankinfosecurity.com/asian-governments-rush-to-ban-deepseek-over-privacy-concerns-a-27476" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/asian-governments-rush-to-ban-deepseek-over-privacy-concerns-a-27476</a></p><p><a href="https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html</a></p><p><a href="https://www.securityweek.com/trimble-cityworks-customers-warned-of-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trimble-cityworks-customers-warned-of-zero-day-exploitation/</a></p><p><a href="https://therecord.media/avery-products-ransomware-data-breach-notification" rel="noopener noreferrer" target="_blank">https://therecord.media/avery-products-ransomware-data-breach-notification</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-notifies-employees-of-data-breach-after-russian-office-365-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hpe-notifies-employees-of-data-breach-after-russian-office-365-hack/</a></p><p><a href="https://www.securityweek.com/information-of-883000-stolen-in-crippling-attack-on-hospital-sisters-health-system/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/information-of-883000-stolen-in-crippling-attack-on-hospital-sisters-health-system/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/</a></p><p><a href="https://www.securityweek.com/1000-apps-used-in-malicious-campaign-targeting-android-users-in-india/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/1000-apps-used-in-malicious-campaign-targeting-android-users-in-india/</a></p><p><a href="https://www.cybersecuritydive.com/news/north-korean-hackers--fake-interview/739165/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/north-korean-hackers--fake-interview/739165/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e48b3d81-6fa3-403d-9196-9474dc6e8a1d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 10 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/66ac2ff3-8599-4711-b772-289cb30e497b/UK-Government-Demands-Apple-iCloud-Backdoor-Deepseek-Bans-Raise.mp3" length="25881468" type="audio/mpeg"/><itunes:duration>17:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>860</itunes:episode><podcast:episode>860</podcast:episode></item><item><title>🎙️ Deepseek AI linked to Chinese Telecom, CISA Tags Exploits in Linux, .Net &amp; Apache, North Korean Threats</title><itunes:title>🎙️ Deepseek AI linked to Chinese Telecom, CISA Tags Exploits in Linux, .Net &amp; Apache, North Korean Threats</itunes:title><description><![CDATA[<p>🎙️ Deepseek AI linked to Chinese Telecom, CISA Tags Exploits in Linux, .Net &amp; Apache, North Korean Threats &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek AI linked to Chinese Telecom with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Thailand Cuts power to Scams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Spain Arrests Cybercriminal</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/researchers-link-deepseeks-blockbuster-chatbot-to-chinese-telecom-banned-from-doing-business-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researchers-link-deepseeks-blockbuster-chatbot-to-chinese-telecom-banned-from-doing-business-in-us/</a></p><p><a href="https://therecord.media/thailand-cuts-power-scam-compounds-myanmar" rel="noopener noreferrer" target="_blank">https://therecord.media/thailand-cuts-power-scam-compounds-myanmar</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-linux-kernel-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-linux-kernel-bug-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-management-product/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-management-product/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-microsoft-net-and-apache-ofbiz-bugs-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-microsoft-net-and-apache-ofbiz-bugs-as-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html</a></p><p><a href="https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/spain-arrests-suspected-hacker-of-us-and-spanish-military-agencies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/spain-arrests-suspected-hacker-of-us-and-spanish-military-agencies/</a></p><p><a href="https://www.cybersecuritydive.com/news/deloitte-5m-rhode-social-services/739309/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/deloitte-5m-rhode-social-services/739309/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Deepseek AI linked to Chinese Telecom, CISA Tags Exploits in Linux, .Net &amp; Apache, North Korean Threats &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek AI linked to Chinese Telecom with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Thailand Cuts power to Scams</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Patch</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Spain Arrests Cybercriminal</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/researchers-link-deepseeks-blockbuster-chatbot-to-chinese-telecom-banned-from-doing-business-in-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researchers-link-deepseeks-blockbuster-chatbot-to-chinese-telecom-banned-from-doing-business-in-us/</a></p><p><a href="https://therecord.media/thailand-cuts-power-scam-compounds-myanmar" rel="noopener noreferrer" target="_blank">https://therecord.media/thailand-cuts-power-scam-compounds-myanmar</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-linux-kernel-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-linux-kernel-bug-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-management-product/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-management-product/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-microsoft-net-and-apache-ofbiz-bugs-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-microsoft-net-and-apache-ofbiz-bugs-as-exploited-in-attacks/</a></p><p><a href="https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html</a></p><p><a href="https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/spain-arrests-suspected-hacker-of-us-and-spanish-military-agencies/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/spain-arrests-suspected-hacker-of-us-and-spanish-military-agencies/</a></p><p><a href="https://www.cybersecuritydive.com/news/deloitte-5m-rhode-social-services/739309/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/deloitte-5m-rhode-social-services/739309/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">215073f7-d495-4798-a85f-f345f36036bd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 06 Feb 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/aeabf95c-efba-4862-9975-6ddb96f403fc/Deepseek-AI-linked-to-Chinese-Telecom-CISA-Tags-Exploits-in-Lin.mp3" length="21188204" type="audio/mpeg"/><itunes:duration>14:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>859</itunes:episode><podcast:episode>859</podcast:episode></item><item><title>Russian Hackers use 7-Zip Zero-Day, Securing Network Edge Devices, Ransomware News, Okta Layoffs</title><itunes:title>Russian Hackers use 7-Zip Zero-Day, Securing Network Edge Devices, Ransomware News, Okta Layoffs</itunes:title><description><![CDATA[<p>🎙️ Russian Hackers use 7-Zip Zero-Day, Securing Network Edge Devices, Ransomware News, Okta Layoffs &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Russian Hackers use 7-Zip Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Cyberspies abuse SSH</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Veeam Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome and Firefox Patches</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/zyxel-issues-no-patch-warning-for-exploited-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zyxel-issues-no-patch-warning-for-exploited-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyber-agencies-share-security-guidance-for-network-edge-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyber-agencies-share-security-guidance-for-network-edge-devices/</a></p><p><a href="https://www.cybersecuritydive.com/news/network-security-defects-erode-defense/738387/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/network-security-defects-erode-defense/738387/</a></p><p><a href="https://therecord.media/ransomware-payments-drop-2024-chainalysis-report" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-payments-drop-2024-chainalysis-report</a></p><p><a href="https://www.securityweek.com/russian-hackers-exploited-7-zip-zero-day-against-ukraine/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-exploited-7-zip-zero-day-against-ukraine/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-use-new-ssh-backdoor-in-network-device-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-cyberspies-use-new-ssh-backdoor-in-network-device-hacks/</a></p><p><a href="https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html</a></p><p><a href="https://www.securityweek.com/chrome-133-firefox-135-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-133-firefox-135-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/okta-carries-out-another-round-layoffs-axing-180-workers-a-27445" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/okta-carries-out-another-round-layoffs-axing-180-workers-a-27445</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Russian Hackers use 7-Zip Zero-Day, Securing Network Edge Devices, Ransomware News, Okta Layoffs &nbsp;&nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Russian Hackers use 7-Zip Zero-Day with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Cyberspies abuse SSH</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Veeam Flaw</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chrome and Firefox Patches</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/zyxel-issues-no-patch-warning-for-exploited-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/zyxel-issues-no-patch-warning-for-exploited-zero-days/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyber-agencies-share-security-guidance-for-network-edge-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyber-agencies-share-security-guidance-for-network-edge-devices/</a></p><p><a href="https://www.cybersecuritydive.com/news/network-security-defects-erode-defense/738387/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/network-security-defects-erode-defense/738387/</a></p><p><a href="https://therecord.media/ransomware-payments-drop-2024-chainalysis-report" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomware-payments-drop-2024-chainalysis-report</a></p><p><a href="https://www.securityweek.com/russian-hackers-exploited-7-zip-zero-day-against-ukraine/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hackers-exploited-7-zip-zero-day-against-ukraine/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-use-new-ssh-backdoor-in-network-device-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-cyberspies-use-new-ssh-backdoor-in-network-device-hacks/</a></p><p><a href="https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html</a></p><p><a href="https://www.securityweek.com/chrome-133-firefox-135-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-133-firefox-135-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bankinfosecurity.com/okta-carries-out-another-round-layoffs-axing-180-workers-a-27445" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/okta-carries-out-another-round-layoffs-axing-180-workers-a-27445</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">e9e4c06f-c98e-4bfc-9b15-3165bf782e30</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 05 Feb 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b67d8e7c-d6e7-4cdb-bc6c-fc4116cf6023/Russian-Hackers-use-7-Zip-Zero-Day-Securing-Network-Edge-Device.mp3" length="24593736" type="audio/mpeg"/><itunes:duration>17:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>858</itunes:episode><podcast:episode>858</podcast:episode></item><item><title>Deepseek Blocked in US Federal Agencies, Grubhub Data Breach, Android Zeroday, Azure AI Patch</title><itunes:title>Deepseek Blocked in US Federal Agencies, Grubhub Data Breach, Android Zeroday, Azure AI Patch</itunes:title><description><![CDATA[<p>🎙️ Deepseek Blocked in US Federal Agencies, Grubhub Data Breach, Android Zeroday, Azure AI Patch</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek Blocked in US Federal Agencies with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GrubHub Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mississippii Utility Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Blocked Record Risky Apps</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/deepseek-blocked-in-us-federal-agencies-a-27435" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/deepseek-blocked-in-us-federal-agencies-a-27435</a></p><p><a href="https://www.bankinfosecurity.com/singapore-to-probe-deepseeks-high-end-nvidia-chip-purchases-a-27434" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/singapore-to-probe-deepseeks-high-end-nvidia-chip-purchases-a-27434</a></p><p><a href="https://www.securityweek.com/developers-targeted-with-malware-disguised-as-deepseek-package/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/developers-targeted-with-malware-disguised-as-deepseek-package/</a></p><p><a href="https://www.securityweek.com/personal-information-compromised-in-grubhub-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/personal-information-compromised-in-grubhub-data-breach/</a></p><p><a href="https://therecord.media/mississippii-electric-utility-residents-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/mississippii-electric-utility-residents-breach</a></p><p><a href="https://www.securityweek.com/vulnerability-patched-in-android-possibly-exploited-by-forensic-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerability-patched-in-android-possibly-exploited-by-forensic-tools/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-blocked-236-million-risky-android-apps-from-play-store-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-blocked-236-million-risky-android-apps-from-play-store-in-2024/</a></p><p><a href="https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html</a></p><p><a href="https://therecord.media/arrest-thai-police-woman-romance-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/arrest-thai-police-woman-romance-scam</a></p><p><a href="https://www.bleepingcomputer.com/news/security/canadian-charged-with-stealing-65-million-using-defi-crypto-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canadian-charged-with-stealing-65-million-using-defi-crypto-exploits/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Deepseek Blocked in US Federal Agencies, Grubhub Data Breach, Android Zeroday, Azure AI Patch</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek Blocked in US Federal Agencies with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GrubHub Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Mississippii Utility Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Google Blocked Record Risky Apps</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/deepseek-blocked-in-us-federal-agencies-a-27435" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/deepseek-blocked-in-us-federal-agencies-a-27435</a></p><p><a href="https://www.bankinfosecurity.com/singapore-to-probe-deepseeks-high-end-nvidia-chip-purchases-a-27434" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/singapore-to-probe-deepseeks-high-end-nvidia-chip-purchases-a-27434</a></p><p><a href="https://www.securityweek.com/developers-targeted-with-malware-disguised-as-deepseek-package/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/developers-targeted-with-malware-disguised-as-deepseek-package/</a></p><p><a href="https://www.securityweek.com/personal-information-compromised-in-grubhub-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/personal-information-compromised-in-grubhub-data-breach/</a></p><p><a href="https://therecord.media/mississippii-electric-utility-residents-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/mississippii-electric-utility-residents-breach</a></p><p><a href="https://www.securityweek.com/vulnerability-patched-in-android-possibly-exploited-by-forensic-tools/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerability-patched-in-android-possibly-exploited-by-forensic-tools/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-blocked-236-million-risky-android-apps-from-play-store-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-blocked-236-million-risky-android-apps-from-play-store-in-2024/</a></p><p><a href="https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html</a></p><p><a href="https://therecord.media/arrest-thai-police-woman-romance-scam" rel="noopener noreferrer" target="_blank">https://therecord.media/arrest-thai-police-woman-romance-scam</a></p><p><a href="https://www.bleepingcomputer.com/news/security/canadian-charged-with-stealing-65-million-using-defi-crypto-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/canadian-charged-with-stealing-65-million-using-defi-crypto-exploits/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3a934473-05d9-492f-a1e4-220a4f3300c4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 04 Feb 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8f1066a7-3b20-4872-a479-02dc1e8c011b/Deepseek-Blocked-in-US-Federal-Agencies-Grubhub-Data-Breach-And.mp3" length="30552162" type="audio/mpeg"/><itunes:duration>21:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>857</itunes:episode><podcast:episode>857</podcast:episode></item><item><title>Tata Technologies Ransomware Attack, Keir Starmer Email Hacked, Texas Bans Deepseek &amp; Rednote</title><itunes:title>Tata Technologies Ransomware Attack, Keir Starmer Email Hacked, Texas Bans Deepseek &amp; Rednote</itunes:title><description><![CDATA[<p>🎙️ Tata Technologies Ransomware Attack, Keir Starmer Email Hacked, Texas Bans Deepseek &amp; Rednote</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Tata Technologies Ransomware Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Polish Justice Minister Arrested for Spyware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Casio Website infected in Skimmer</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Blocks Deepseek AI</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/</a></p><p><a href="https://therecord.media/keir-starmer-email-hack-russia-suspected" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-starmer-email-hack-russia-suspected</a></p><p><a href="https://www.securityweek.com/texas-governor-orders-ban-on-deepseek-rednote-for-government-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/texas-governor-orders-ban-on-deepseek-rednote-for-government-devices/</a></p><p><a href="https://www.securityweek.com/italy-blocks-access-to-the-chinese-ai-application-deepseek-to-protect-users-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/italy-blocks-access-to-the-chinese-ai-application-deepseek-to-protect-users-data/</a></p><p><a href="https://therecord.media/poland-spyware-former-justice-minister-arrested" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-spyware-former-justice-minister-arrested</a></p><p><a href="https://www.securityweek.com/casio-website-infected-with-skimmer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/casio-website-infected-with-skimmer/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-adds-project-archiving-system-to-stop-malicious-updates/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pypi-adds-project-archiving-system-to-stop-malicious-updates/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/new-jailbreaks-manipulate-github-copilot" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/new-jailbreaks-manipulate-github-copilot</a></p><p><a href="https://www.bankinfosecurity.com/critical-uk-government-systems-at-high-risk-warn-auditors-a-27423" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/critical-uk-government-systems-at-high-risk-warn-auditors-a-27423</a></p><p><a href="https://www.securityweek.com/us-dutch-authorities-disrupt-pakistani-hacking-shop-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-dutch-authorities-disrupt-pakistani-hacking-shop-network/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Tata Technologies Ransomware Attack, Keir Starmer Email Hacked, Texas Bans Deepseek &amp; Rednote</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Tata Technologies Ransomware Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Polish Justice Minister Arrested for Spyware</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Casio Website infected in Skimmer</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Blocks Deepseek AI</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/</a></p><p><a href="https://therecord.media/keir-starmer-email-hack-russia-suspected" rel="noopener noreferrer" target="_blank">https://therecord.media/keir-starmer-email-hack-russia-suspected</a></p><p><a href="https://www.securityweek.com/texas-governor-orders-ban-on-deepseek-rednote-for-government-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/texas-governor-orders-ban-on-deepseek-rednote-for-government-devices/</a></p><p><a href="https://www.securityweek.com/italy-blocks-access-to-the-chinese-ai-application-deepseek-to-protect-users-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/italy-blocks-access-to-the-chinese-ai-application-deepseek-to-protect-users-data/</a></p><p><a href="https://therecord.media/poland-spyware-former-justice-minister-arrested" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-spyware-former-justice-minister-arrested</a></p><p><a href="https://www.securityweek.com/casio-website-infected-with-skimmer/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/casio-website-infected-with-skimmer/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-adds-project-archiving-system-to-stop-malicious-updates/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pypi-adds-project-archiving-system-to-stop-malicious-updates/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/new-jailbreaks-manipulate-github-copilot" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/new-jailbreaks-manipulate-github-copilot</a></p><p><a href="https://www.bankinfosecurity.com/critical-uk-government-systems-at-high-risk-warn-auditors-a-27423" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/critical-uk-government-systems-at-high-risk-warn-auditors-a-27423</a></p><p><a href="https://www.securityweek.com/us-dutch-authorities-disrupt-pakistani-hacking-shop-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-dutch-authorities-disrupt-pakistani-hacking-shop-network/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">01224034-75bc-446b-846d-3b2840447fcd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 03 Feb 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/23c56f6d-0c03-4f4a-a500-2dffaa15fa32/Tata-Technologies-Ransomware-Attack-Keir-Starmer-Email-Hacked-T.mp3" length="27209324" type="audio/mpeg"/><itunes:duration>18:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>856</itunes:episode><podcast:episode>856</podcast:episode></item><item><title>Wiz Exposes DeepSeek Database Leak, Zyxel Unpatched Flaw, Nulled Cybercrime Website Seized, Mirai Botnet</title><itunes:title>Wiz Exposes DeepSeek Database Leak, Zyxel Unpatched Flaw, Nulled Cybercrime Website Seized, Mirai Botnet</itunes:title><description><![CDATA[<p>🎙️ Wiz Exposes DeepSeek Database Leak, Zyxel Unpatched Flaw, Nulled Cybercrime Website Seized, Mirai Botnet</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Wiz Exposes DeepSeek Database Leak with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Asks Deepseek info collection &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas AG Targets Kia &amp; Data Brokers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lazarus Admin Layer uncovered</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak" rel="noopener noreferrer" target="_blank">https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak</a></p><p><a href="https://therecord.media/italian-regulator-deepseek-info-collection" rel="noopener noreferrer" target="_blank">https://therecord.media/italian-regulator-deepseek-info-collection</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices/</a></p><p><a href="https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws</a></p><p><a href="https://therecord.media/texas-warns-kia-about-sharing-driver-info-to-data-brokers" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-warns-kia-about-sharing-driver-info-to-data-brokers</a></p><p><a href="https://www.securityweek.com/nulled-other-cybercrime-websites-seized-by-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nulled-other-cybercrime-websites-seized-by-law-enforcement/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers</a></p><p><a href="https://therecord.media/poland-accuses-russia-of-recruiting-citizens-online-for-election-meddling" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-accuses-russia-of-recruiting-citizens-online-for-election-meddling</a></p><p><a href="https://www.securityweek.com/tenable-to-acquire-vulcan-cyber-for-150-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tenable-to-acquire-vulcan-cyber-for-150-million/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Wiz Exposes DeepSeek Database Leak, Zyxel Unpatched Flaw, Nulled Cybercrime Website Seized, Mirai Botnet</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Wiz Exposes DeepSeek Database Leak with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Italy Asks Deepseek info collection &nbsp;</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas AG Targets Kia &amp; Data Brokers</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Lazarus Admin Layer uncovered</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak" rel="noopener noreferrer" target="_blank">https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak</a></p><p><a href="https://therecord.media/italian-regulator-deepseek-info-collection" rel="noopener noreferrer" target="_blank">https://therecord.media/italian-regulator-deepseek-info-collection</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices/</a></p><p><a href="https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws</a></p><p><a href="https://therecord.media/texas-warns-kia-about-sharing-driver-info-to-data-brokers" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-warns-kia-about-sharing-driver-info-to-data-brokers</a></p><p><a href="https://www.securityweek.com/nulled-other-cybercrime-websites-seized-by-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nulled-other-cybercrime-websites-seized-by-law-enforcement/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers</a></p><p><a href="https://therecord.media/poland-accuses-russia-of-recruiting-citizens-online-for-election-meddling" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-accuses-russia-of-recruiting-citizens-online-for-election-meddling</a></p><p><a href="https://www.securityweek.com/tenable-to-acquire-vulcan-cyber-for-150-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/tenable-to-acquire-vulcan-cyber-for-150-million/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">96ca4e6c-2512-4590-ac94-983bba3e8531</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 30 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/eaff34a8-5535-4562-8826-d72b98b50d40/Wiz-Exposes-DeepSeek-Database-Leak-Zyxel-Unpatched-Flaw-Nulled-.mp3" length="29133399" type="audio/mpeg"/><itunes:duration>20:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>855</itunes:episode><podcast:episode>855</podcast:episode></item><item><title>OpenAI Probes DeepSeek Potential IP Theft, BeyondTrust Names 17 Victims, ENGlobal Ransomware Attack</title><itunes:title>OpenAI Probes DeepSeek Potential IP Theft, BeyondTrust Names 17 Victims, ENGlobal Ransomware Attack</itunes:title><description><![CDATA[<p>🎙️ OpenAI Probes DeepSeek Potential IP Theft, BeyondTrust Names 17 Victims, ENGlobal Ransomware Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as OpenAI Probes DeepSeek Potential IP Theft with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ENGlobal Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Rockwell Patches Critical Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Centerpoint Investigates Data Leak</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/tech/ai/openai-china-deepseek-chatgpt-probe-ce6b864e?mod=hp_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/openai-china-deepseek-chatgpt-probe-ce6b864e?mod=hp_lead_pos2</a></p><p><a href="https://therecord.media/englobal-ransomware-attack-six-weeks-disruption" rel="noopener noreferrer" target="_blank">https://therecord.media/englobal-ransomware-attack-six-weeks-disruption</a></p><p><a href="https://www.cybersecuritydive.com/news/beyondtrust-17-customers-december-cyberattack/738246/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/beyondtrust-17-customers-december-cyberattack/738246/</a></p><p><a href="https://www.darkreading.com/cloud-security/actively-exploited-fortinet-zero-day-attackers-super-admin-privileges" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/actively-exploited-fortinet-zero-day-attackers-super-admin-privileges</a></p><p><a href="https://www.securityweek.com/rockwell-patches-critical-high-severity-vulnerabilities-in-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-patches-critical-high-severity-vulnerabilities-in-several-products/</a></p><p><a href="https://therecord.media/texas-utility-firm-investigating-potential-data-leak-moveit-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-utility-firm-investigating-potential-data-leak-moveit-breach</a></p><p><a href="https://www.securityweek.com/new-slap-and-flop-cpu-attacks-expose-data-from-apple-computers-phones/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-slap-and-flop-cpu-attacks-expose-data-from-apple-computers-phones/</a></p><p><a href="https://www.darkreading.com/application-security/oauth-flaw-exposed-millions-airline-users-account-takeovers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/oauth-flaw-exposed-millions-airline-users-account-takeovers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ OpenAI Probes DeepSeek Potential IP Theft, BeyondTrust Names 17 Victims, ENGlobal Ransomware Attack</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as OpenAI Probes DeepSeek Potential IP Theft with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ENGlobal Ransomware Attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Rockwell Patches Critical Vulnerability</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Centerpoint Investigates Data Leak</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/tech/ai/openai-china-deepseek-chatgpt-probe-ce6b864e?mod=hp_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/openai-china-deepseek-chatgpt-probe-ce6b864e?mod=hp_lead_pos2</a></p><p><a href="https://therecord.media/englobal-ransomware-attack-six-weeks-disruption" rel="noopener noreferrer" target="_blank">https://therecord.media/englobal-ransomware-attack-six-weeks-disruption</a></p><p><a href="https://www.cybersecuritydive.com/news/beyondtrust-17-customers-december-cyberattack/738246/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/beyondtrust-17-customers-december-cyberattack/738246/</a></p><p><a href="https://www.darkreading.com/cloud-security/actively-exploited-fortinet-zero-day-attackers-super-admin-privileges" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/actively-exploited-fortinet-zero-day-attackers-super-admin-privileges</a></p><p><a href="https://www.securityweek.com/rockwell-patches-critical-high-severity-vulnerabilities-in-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-patches-critical-high-severity-vulnerabilities-in-several-products/</a></p><p><a href="https://therecord.media/texas-utility-firm-investigating-potential-data-leak-moveit-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-utility-firm-investigating-potential-data-leak-moveit-breach</a></p><p><a href="https://www.securityweek.com/new-slap-and-flop-cpu-attacks-expose-data-from-apple-computers-phones/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-slap-and-flop-cpu-attacks-expose-data-from-apple-computers-phones/</a></p><p><a href="https://www.darkreading.com/application-security/oauth-flaw-exposed-millions-airline-users-account-takeovers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/oauth-flaw-exposed-millions-airline-users-account-takeovers</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7104219d-da73-4eea-8365-617b3e6ea915</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 29 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5bb03170-c884-4fa5-b946-874d727f80bd/OpenAI-Probes-DeepSeek-Potential-IP-Theft-BeyondTrust-Names-17-.mp3" length="29288253" type="audio/mpeg"/><itunes:duration>20:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>854</itunes:episode><podcast:episode>854</podcast:episode></item><item><title>Deepseek AI Cyber Attack &amp; Disruption, MGM Settles Data Breach Lawsuit, Apple Zeroday Patched</title><itunes:title>Deepseek AI Cyber Attack &amp; Disruption, MGM Settles Data Breach Lawsuit, Apple Zeroday Patched</itunes:title><description><![CDATA[<p>🎙️ Deepseek AI Cyber Attack &amp; Disruption, MGM Settles Data Breach Lawsuit, Apple Zeroday Patched</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek AI Cyber attack &amp; Disruption with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas County Declares Emergency after Cyber attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Hijacks Sirens in Israel</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;LTE &amp; 5G Vulnerabilities could cripple the US</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/deepseek-blames-disruption-on-cyberattack-as-vulnerabilities-emerge/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/deepseek-blames-disruption-on-cyberattack-as-vulnerabilities-emerge/</a></p><p><a href="https://therecord.media/texas-county-disaster-declaration-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-county-disaster-declaration-cyberattack</a></p><p><a href="https://www.securityweek.com/talktalk-confirms-data-breach-downplays-impact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/talktalk-confirms-data-breach-downplays-impact/</a></p><p><a href="https://www.wsj.com/articles/mgm-agrees-to-pay-45-million-to-settle-data-breach-lawsuit-e076c842?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/mgm-agrees-to-pay-45-million-to-settle-data-breach-lawsuit-e076c842?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/apple-patches-first-exploited-ios-zero-day-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-first-exploited-ios-zero-day-of-2025/</a></p><p><a href="https://therecord.media/hackers-hijack-sirens-iran-israel" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-hijack-sirens-iran-israel</a></p><p><a href="https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/</a></p><p><a href="https://www.darkreading.com/cloud-security/cyberattackers-ghostgpt-write-malicious-code" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/cyberattackers-ghostgpt-write-malicious-code</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Deepseek AI Cyber Attack &amp; Disruption, MGM Settles Data Breach Lawsuit, Apple Zeroday Patched</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Deepseek AI Cyber attack &amp; Disruption with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Texas County Declares Emergency after Cyber attack</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Iran Hijacks Sirens in Israel</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;LTE &amp; 5G Vulnerabilities could cripple the US</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/deepseek-blames-disruption-on-cyberattack-as-vulnerabilities-emerge/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/deepseek-blames-disruption-on-cyberattack-as-vulnerabilities-emerge/</a></p><p><a href="https://therecord.media/texas-county-disaster-declaration-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-county-disaster-declaration-cyberattack</a></p><p><a href="https://www.securityweek.com/talktalk-confirms-data-breach-downplays-impact/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/talktalk-confirms-data-breach-downplays-impact/</a></p><p><a href="https://www.wsj.com/articles/mgm-agrees-to-pay-45-million-to-settle-data-breach-lawsuit-e076c842?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/mgm-agrees-to-pay-45-million-to-settle-data-breach-lawsuit-e076c842?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/apple-patches-first-exploited-ios-zero-day-of-2025/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-first-exploited-ios-zero-day-of-2025/</a></p><p><a href="https://therecord.media/hackers-hijack-sirens-iran-israel" rel="noopener noreferrer" target="_blank">https://therecord.media/hackers-hijack-sirens-iran-israel</a></p><p><a href="https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/</a></p><p><a href="https://www.darkreading.com/cloud-security/cyberattackers-ghostgpt-write-malicious-code" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/cyberattackers-ghostgpt-write-malicious-code</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">a44f4aa0-2143-48b5-9895-77397bcc166d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 28 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a4a9c277-e87b-4df0-9d37-8eb76bdffb4b/Deepseek-AI-Cyber-Attack-Disruption-MGM-Settles-Data-Breach-Law.mp3" length="24454555" type="audio/mpeg"/><itunes:duration>16:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>853</itunes:episode><podcast:episode>853</podcast:episode></item><item><title>UnitedHealth Victim Count Reaches 190M, $69M Stolen from Phemex, DeepSeek AI Concerns, Salt Typhoon</title><itunes:title>UnitedHealth Victim Count Reaches 190M, $69M Stolen from Phemex, DeepSeek AI Concerns, Salt Typhoon</itunes:title><description><![CDATA[<p>🎙️ UnitedHealth Victim Count Reaches 190M, $69M Stolen from Phemex, DeepSeek AI Concerns, Salt Typhoon&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as UnitedHealth Victim Count Reaches 190M with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Meeting Management Bug</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSH Tunnels for ESXi Access</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Zyxel Bad Signature</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/unitedhealth-now-says-190-million-impacted-by-2024-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/unitedhealth-now-says-190-million-impacted-by-2024-data-breach/</a></p><p><a href="https://therecord.media/69-million-stolen-cyberattack-crypto-platform-phemex" rel="noopener noreferrer" target="_blank">https://therecord.media/69-million-stolen-cyberattack-crypto-platform-phemex</a></p><p><a href="https://www.wsj.com/livecoverage/stock-market-today-dow-sp500-nasdaq-live-01-27-2025/card/what-is-deepseek-and-why-is-it-rattling-tech-stocks--mOeGwTTGQmyUTNPrqaIq" rel="noopener noreferrer" target="_blank">https://www.wsj.com/livecoverage/stock-market-today-dow-sp500-nasdaq-live-01-27-2025/card/what-is-deepseek-and-why-is-it-rattling-tech-stocks--mOeGwTTGQmyUTNPrqaIq</a></p><p><a href="https://www.bankinfosecurity.com/patching-lags-for-vulnerabilities-targeted-by-salt-typhoon-a-27371" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/patching-lags-for-vulnerabilities-targeted-by-salt-typhoon-a-27371</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/cisco-critical-meeting-management-bug-urgent-patch" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/cisco-critical-meeting-management-bug-urgent-patch</a></p><p><a href="https://www.bleepingcomputer.com/news/security/zyxel-warns-of-bad-signature-update-causing-firewall-boot-loops/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/zyxel-warns-of-bad-signature-update-causing-firewall-boot-loops/</a></p><p><a href="https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/</a></p><p><a href="https://www.securityweek.com/git-vulnerabilities-led-to-credentials-exposure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/git-vulnerabilities-led-to-credentials-exposure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ssh-tunnels-for-stealthy-vmware-esxi-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ssh-tunnels-for-stealthy-vmware-esxi-access/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/paypal-to-pay-2-million-settlement-over-2022-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-to-pay-2-million-settlement-over-2022-data-breach/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ UnitedHealth Victim Count Reaches 190M, $69M Stolen from Phemex, DeepSeek AI Concerns, Salt Typhoon&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as UnitedHealth Victim Count Reaches 190M with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Cisco Meeting Management Bug</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SSH Tunnels for ESXi Access</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Zyxel Bad Signature</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/unitedhealth-now-says-190-million-impacted-by-2024-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/unitedhealth-now-says-190-million-impacted-by-2024-data-breach/</a></p><p><a href="https://therecord.media/69-million-stolen-cyberattack-crypto-platform-phemex" rel="noopener noreferrer" target="_blank">https://therecord.media/69-million-stolen-cyberattack-crypto-platform-phemex</a></p><p><a href="https://www.wsj.com/livecoverage/stock-market-today-dow-sp500-nasdaq-live-01-27-2025/card/what-is-deepseek-and-why-is-it-rattling-tech-stocks--mOeGwTTGQmyUTNPrqaIq" rel="noopener noreferrer" target="_blank">https://www.wsj.com/livecoverage/stock-market-today-dow-sp500-nasdaq-live-01-27-2025/card/what-is-deepseek-and-why-is-it-rattling-tech-stocks--mOeGwTTGQmyUTNPrqaIq</a></p><p><a href="https://www.bankinfosecurity.com/patching-lags-for-vulnerabilities-targeted-by-salt-typhoon-a-27371" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/patching-lags-for-vulnerabilities-targeted-by-salt-typhoon-a-27371</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/cisco-critical-meeting-management-bug-urgent-patch" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/cisco-critical-meeting-management-bug-urgent-patch</a></p><p><a href="https://www.bleepingcomputer.com/news/security/zyxel-warns-of-bad-signature-update-causing-firewall-boot-loops/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/zyxel-warns-of-bad-signature-update-causing-firewall-boot-loops/</a></p><p><a href="https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/</a></p><p><a href="https://www.securityweek.com/git-vulnerabilities-led-to-credentials-exposure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/git-vulnerabilities-led-to-credentials-exposure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ssh-tunnels-for-stealthy-vmware-esxi-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ssh-tunnels-for-stealthy-vmware-esxi-access/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/paypal-to-pay-2-million-settlement-over-2022-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-to-pay-2-million-settlement-over-2022-data-breach/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">7b30bf84-550c-4ead-bab8-546a88b00941</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 27 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e4fd17d-927b-4525-81de-4e4a4e929375/UnitedHealth-Victim-Count-Reaches-190M-69M-Stolen-from-Phemex-D.mp3" length="25540413" type="audio/mpeg"/><itunes:duration>17:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>852</itunes:episode><podcast:episode>852</podcast:episode></item><item><title>Conduent Confirms Cyber Attack, Record Ransomware Attacks Last Month, Sonicwall Zeroday</title><itunes:title>Conduent Confirms Cyber Attack, Record Ransomware Attacks Last Month, Sonicwall Zeroday</itunes:title><description><![CDATA[<p>🎙️ Conduent Confirms Cyber Attack, Record Ransomware Attacks Last Month, Sonicwall Zeroday &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Conduent Confirms Cyber Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Cyberspies Target South Korea</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Zeroday exploits detailed</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia &amp; Iran Cyber Ties Expand</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/conduent-confirms-cybersecurity-incident-behind-recent-outage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/conduent-confirms-cybersecurity-incident-behind-recent-outage/</a></p><p><a href="https://www.securityweek.com/record-number-of-ransomware-attacks-in-december-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/record-number-of-ransomware-attacks-in-december-2024/</a></p><p><a href="https://www.securityweek.com/sonicwall-learns-from-microsoft-about-potentially-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-learns-from-microsoft-about-potentially-exploited-zero-day/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/chinese-cyberspies-target-south-korean-vpn-supply-chain-attack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/chinese-cyberspies-target-south-korean-vpn-supply-chain-attack</a></p><p><a href="https://www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-denial-of-service-flaw-with-poc-exploit-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-denial-of-service-flaw-with-poc-exploit-code/</a></p><p><a href="https://therecord.media/breachforums-resentenced-supervised-release-admin" rel="noopener noreferrer" target="_blank">https://therecord.media/breachforums-resentenced-supervised-release-admin</a></p><p><a href="https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/</a></p><p><a href="https://therecord.media/russia-iran-cyber-ties-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-iran-cyber-ties-agreement</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Conduent Confirms Cyber Attack, Record Ransomware Attacks Last Month, Sonicwall Zeroday &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Conduent Confirms Cyber Attack with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Chinese Cyberspies Target South Korea</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ivanti Zeroday exploits detailed</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russia &amp; Iran Cyber Ties Expand</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/conduent-confirms-cybersecurity-incident-behind-recent-outage/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/conduent-confirms-cybersecurity-incident-behind-recent-outage/</a></p><p><a href="https://www.securityweek.com/record-number-of-ransomware-attacks-in-december-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/record-number-of-ransomware-attacks-in-december-2024/</a></p><p><a href="https://www.securityweek.com/sonicwall-learns-from-microsoft-about-potentially-exploited-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sonicwall-learns-from-microsoft-about-potentially-exploited-zero-day/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/chinese-cyberspies-target-south-korean-vpn-supply-chain-attack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/chinese-cyberspies-target-south-korean-vpn-supply-chain-attack</a></p><p><a href="https://www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-denial-of-service-flaw-with-poc-exploit-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-warns-of-denial-of-service-flaw-with-poc-exploit-code/</a></p><p><a href="https://therecord.media/breachforums-resentenced-supervised-release-admin" rel="noopener noreferrer" target="_blank">https://therecord.media/breachforums-resentenced-supervised-release-admin</a></p><p><a href="https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/</a></p><p><a href="https://therecord.media/russia-iran-cyber-ties-agreement" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-iran-cyber-ties-agreement</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f65bbc0c-4627-4636-82c8-0639cc70fd12</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 23 Jan 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1839712b-1b41-4632-96d9-54d7036b833a/Conduent-Confirms-Cyber-Attack-Record-Ransomware-Attacks-Last-M.mp3" length="25621915" type="audio/mpeg"/><itunes:duration>17:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>851</itunes:episode><podcast:episode>851</podcast:episode></item><item><title>Trump Pardons Silk Road Founder Ulbricht, $500B AI Investment, Record Breaking DDoS Attacks</title><itunes:title>Trump Pardons Silk Road Founder Ulbricht, $500B AI Investment, Record Breaking DDoS Attacks</itunes:title><description><![CDATA[<p>🎙️ Trump Pardons Silk Road Founder Ulbricht, $500B AI Investment, Record Breaking DDoS Attacks &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Trump Pardons Silk Road Founder Ulbricht with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Powerschool Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Executive Order Rescinded</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Teams Phishing Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/record-breaking-ddos-attack-reached-5-6-tbps/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/record-breaking-ddos-attack-reached-5-6-tbps/</a></p><p><a href="https://www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/</a></p><p><a href="https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4?mod=tech_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4?mod=tech_lead_pos2</a></p><p><a href="https://www.bankinfosecurity.com/president-trump-scraps-bidens-ai-safety-executive-order-a-27342" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/president-trump-scraps-bidens-ai-safety-executive-order-a-27342</a></p><p><a href="https://www.securityweek.com/trump-pardons-founder-of-silk-road-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trump-pardons-founder-of-silk-road-website/</a></p><p><a href="https://therecord.media/tsa-chief-behind-cyber-directives-ousted-trump-administration" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-chief-behind-cyber-directives-ousted-trump-administration</a></p><p><a href="https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers</a></p><p><a href="https://www.securityweek.com/researcher-says-abb-building-control-products-affected-by-1000-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researcher-says-abb-building-control-products-affected-by-1000-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-pose-as-it-support-in-microsoft-teams-phishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-pose-as-it-support-in-microsoft-teams-phishing-attacks/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Trump Pardons Silk Road Founder Ulbricht, $500B AI Investment, Record Breaking DDoS Attacks &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Trump Pardons Silk Road Founder Ulbricht with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Powerschool Data Breach</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AI Executive Order Rescinded</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Teams Phishing Attacks</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/record-breaking-ddos-attack-reached-5-6-tbps/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/record-breaking-ddos-attack-reached-5-6-tbps/</a></p><p><a href="https://www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/</a></p><p><a href="https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4?mod=tech_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/ai/tech-leaders-pledge-up-to-500-billion-in-ai-investment-in-u-s-da506cd4?mod=tech_lead_pos2</a></p><p><a href="https://www.bankinfosecurity.com/president-trump-scraps-bidens-ai-safety-executive-order-a-27342" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/president-trump-scraps-bidens-ai-safety-executive-order-a-27342</a></p><p><a href="https://www.securityweek.com/trump-pardons-founder-of-silk-road-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/trump-pardons-founder-of-silk-road-website/</a></p><p><a href="https://therecord.media/tsa-chief-behind-cyber-directives-ousted-trump-administration" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-chief-behind-cyber-directives-ousted-trump-administration</a></p><p><a href="https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers</a></p><p><a href="https://www.securityweek.com/researcher-says-abb-building-control-products-affected-by-1000-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/researcher-says-abb-building-control-products-affected-by-1000-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-pose-as-it-support-in-microsoft-teams-phishing-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gangs-pose-as-it-support-in-microsoft-teams-phishing-attacks/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">afc641ef-57eb-477b-8e1c-039111ac9eef</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 22 Jan 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/870b4ba9-d103-4285-a87a-46fbc679fce0/Trump-Pardons-Silk-Road-Founder-Ulbricht-500B-AI-Investment-Rec.mp3" length="32342072" type="audio/mpeg"/><itunes:duration>22:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>850</itunes:episode><podcast:episode>850</podcast:episode></item><item><title>HPE Investigating Breach Claims, Ukraine Recovers from Russian Cyberattack, GM Data Collection Halted</title><itunes:title>HPE Investigating Breach Claims, Ukraine Recovers from Russian Cyberattack, GM Data Collection Halted</itunes:title><description><![CDATA[<p>🎙️ HPE Investigating Breach Claims, Ukraine Recovers from Russian Cyberattack, GM Data Collection Halted &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as HPE Investigating Breach Claims with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Spies on Critical Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CIA Analyst Pleads Guilty</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Unsecured Tunneling Protocols</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/</a></p><p><a href="https://therecord.media/ukraine-restores-registers-after-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-restores-registers-after-cyberattack</a></p><p><a href="https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/ftc-orders-gm-to-stop-collecting-and-selling-drivers-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/ftc-orders-gm-to-stop-collecting-and-selling-drivers-data/</a></p><p><a href="https://therecord.media/philippines-arrests-chinese-nationa-spying-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/philippines-arrests-chinese-nationa-spying-critical-infrastructure</a></p><p><a href="https://www.securityweek.com/washington-man-admits-to-role-in-multiple-cybercrime-fraud-schemes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-man-admits-to-role-in-multiple-cybercrime-fraud-schemes/</a></p><p><a href="https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ HPE Investigating Breach Claims, Ukraine Recovers from Russian Cyberattack, GM Data Collection Halted &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as HPE Investigating Breach Claims with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;China Spies on Critical Infrastructure</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CIA Analyst Pleads Guilty</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Unsecured Tunneling Protocols</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hpe-investigating-breach-claims-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/</a></p><p><a href="https://therecord.media/ukraine-restores-registers-after-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/ukraine-restores-registers-after-cyberattack</a></p><p><a href="https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/ftc-orders-gm-to-stop-collecting-and-selling-drivers-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/ftc-orders-gm-to-stop-collecting-and-selling-drivers-data/</a></p><p><a href="https://therecord.media/philippines-arrests-chinese-nationa-spying-critical-infrastructure" rel="noopener noreferrer" target="_blank">https://therecord.media/philippines-arrests-chinese-nationa-spying-critical-infrastructure</a></p><p><a href="https://www.securityweek.com/washington-man-admits-to-role-in-multiple-cybercrime-fraud-schemes/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-man-admits-to-role-in-multiple-cybercrime-fraud-schemes/</a></p><p><a href="https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f8fd11fc-b6c5-4df6-bb95-c62ed1bc4621</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 21 Jan 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9952bf76-d2af-4a88-af73-9e5a67623d01/HPE-Investigating-Breach-Claims-Ukraine-Recovers-from-Russian-C.mp3" length="23877144" type="audio/mpeg"/><itunes:duration>16:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>849</itunes:episode><podcast:episode>849</podcast:episode></item><item><title>TikTok Gets lifeline, Salt Typhoon Sanctioned, CISA’s Future Under Trump, FCC Orders Telecom to Secure Networks</title><itunes:title>TikTok Gets lifeline, Salt Typhoon Sanctioned, CISA’s Future Under Trump, FCC Orders Telecom to Secure Networks</itunes:title><description><![CDATA[<p>🎙️ TikTok Gets lifeline, Salt Typhoon Sanctioned, CISA’s Future Under Trump, FCC Secures Telecom &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Tiktok gets a lifeline from President Trump with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salt Typhoon Sanctions from Treasury</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Costa Rica Oil Company Recovery</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Cyberspies spear phishing</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/tech/tiktok-goes-dark-for-u-s-users-while-trump-signals-he-will-save-it-0370b227?mod=hp_lead_pos5" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/tiktok-goes-dark-for-u-s-users-while-trump-signals-he-will-save-it-0370b227?mod=hp_lead_pos5</a></p><p><a href="https://www.securityweek.com/treasury-levels-sanctions-tied-to-a-massive-hack-of-telecom-companies-and-breach-of-its-own-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/treasury-levels-sanctions-tied-to-a-massive-hack-of-telecom-companies-and-breach-of-its-own-network/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fcc-orders-telecoms-to-secure-their-networks-after-salt-tyhpoon-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fcc-orders-telecoms-to-secure-their-networks-after-salt-tyhpoon-hacks/</a></p><p><a href="https://therecord.media/kristi-noem-cisa-smaller-nimble" rel="noopener noreferrer" target="_blank">https://therecord.media/kristi-noem-cisa-smaller-nimble</a></p><p><a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/</a></p><p><a href="https://www.securityweek.com/russian-cyberspies-caught-spear-phishing-with-qr-codes-whatsapp-groups/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-cyberspies-caught-spear-phishing-with-qr-codes-whatsapp-groups/</a></p><p><a href="https://therecord.media/state-department-falcon-cyber-response-costa-rica-recope" rel="noopener noreferrer" target="_blank">https://therecord.media/state-department-falcon-cyber-response-costa-rica-recope</a></p><p><a href="https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-pypi-package-steals-discord-auth-tokens-from-devs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-pypi-package-steals-discord-auth-tokens-from-devs/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ TikTok Gets lifeline, Salt Typhoon Sanctioned, CISA’s Future Under Trump, FCC Secures Telecom &nbsp;</p><p>&nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Tiktok gets a lifeline from President Trump with more news below:</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Salt Typhoon Sanctions from Treasury</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Costa Rica Oil Company Recovery</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Russian Cyberspies spear phishing</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/tech/tiktok-goes-dark-for-u-s-users-while-trump-signals-he-will-save-it-0370b227?mod=hp_lead_pos5" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/tiktok-goes-dark-for-u-s-users-while-trump-signals-he-will-save-it-0370b227?mod=hp_lead_pos5</a></p><p><a href="https://www.securityweek.com/treasury-levels-sanctions-tied-to-a-massive-hack-of-telecom-companies-and-breach-of-its-own-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/treasury-levels-sanctions-tied-to-a-massive-hack-of-telecom-companies-and-breach-of-its-own-network/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fcc-orders-telecoms-to-secure-their-networks-after-salt-tyhpoon-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fcc-orders-telecoms-to-secure-their-networks-after-salt-tyhpoon-hacks/</a></p><p><a href="https://therecord.media/kristi-noem-cisa-smaller-nimble" rel="noopener noreferrer" target="_blank">https://therecord.media/kristi-noem-cisa-smaller-nimble</a></p><p><a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/</a></p><p><a href="https://www.securityweek.com/russian-cyberspies-caught-spear-phishing-with-qr-codes-whatsapp-groups/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-cyberspies-caught-spear-phishing-with-qr-codes-whatsapp-groups/</a></p><p><a href="https://therecord.media/state-department-falcon-cyber-response-costa-rica-recope" rel="noopener noreferrer" target="_blank">https://therecord.media/state-department-falcon-cyber-response-costa-rica-recope</a></p><p><a href="https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-pypi-package-steals-discord-auth-tokens-from-devs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-pypi-package-steals-discord-auth-tokens-from-devs/</a></p><p>&nbsp;</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p>&nbsp;</p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p>&nbsp;</p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>&nbsp;</p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>&nbsp;</p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9bb5c177-7302-4f77-8ff5-937e579db533</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 20 Jan 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7787e496-6f27-4c3d-976b-a79a02bab3c7/TikTok-Gets-lifeline-Salt-Typhoon-Sanctioned-CISA-s-Future-Unde.mp3" length="26586147" type="audio/mpeg"/><itunes:duration>18:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>848</itunes:episode><podcast:episode>848</podcast:episode></item><item><title>Building Resilient Leadership: Insights on Cybersecurity, Startups, and AI with Andy Ellis</title><itunes:title>Building Resilient Leadership: Insights on Cybersecurity, Startups, and AI with Andy Ellis</itunes:title><description><![CDATA[<p>This interview offers practical takeaways for CISOs, founders, and practitioners navigating the ever-changing cybersecurity landscape. Don't miss Andy Ellis's <em>1% Leadership</em> for actionable strategies to lead effectively in high-stakes environments. </p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>This interview offers practical takeaways for CISOs, founders, and practitioners navigating the ever-changing cybersecurity landscape. Don't miss Andy Ellis's <em>1% Leadership</em> for actionable strategies to lead effectively in high-stakes environments. </p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">2e5308c0-c5c5-437c-9739-52a0a19f52c1</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Fri, 17 Jan 2025 11:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a1ab6c88-dc97-48e6-b74b-f3174b2b31d2/Andy-Ellis-CHP-01.mp3" length="74768273" type="audio/mpeg"/><itunes:duration>51:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>847</itunes:episode><podcast:episode>847</podcast:episode></item><item><title>585 Healthcare Data Breaches in 2024, 15K Fortinet Firewall Data Leaked, Business Risk Concerns Raise due to Cybersecurity</title><itunes:title>585 Healthcare Data Breaches in 2024, 15K Fortinet Firewall Data Leaked, Business Risk Concerns Raise due to Cybersecurity</itunes:title><description><![CDATA[<p>🎙️ 585 Healthcare Data Breaches in 2024, 15K Fortinet Firewall Data Leaked, Business Risk Concerns Raise due to Cybersecurity</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as 585 Healthcare Data Breaches in 2024 with more news below:</p><p>• CISA Warns of Second Beyondtrust Flaw &nbsp;&nbsp;</p><p>• GoDaddy Targeted by FTC</p><p>• CISA vs SEC for Incident Response &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/2024-us-healthcare-data-breaches-585-incidents-180-million-compromised-user-records/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/2024-us-healthcare-data-breaches-585-incidents-180-million-compromised-user-records/</a></p><p><a href="https://www.securityweek.com/data-from-15000-fortinet-firewalls-leaked-by-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/data-from-15000-fortinet-firewalls-leaked-by-hackers/</a></p><p><a href="https://therecord.media/ftc-godaddy-cyber-failings-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/ftc-godaddy-cyber-failings-fine</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-critical-vulnerabilities-in-netweaver-application-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-critical-vulnerabilities-in-netweaver-application-servers/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/cisa-warns-of-second-vuln-found-in-beyondtrust-breach-investigation" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/cisa-warns-of-second-vuln-found-in-beyondtrust-breach-investigation</a></p><p><a href="https://therecord.media/cyber-incident-reporting-sec-circia-cisa-easterly" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incident-reporting-sec-circia-cisa-easterly</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/attackers-hijack-google-advertiser-accounts-malware" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/attackers-hijack-google-advertiser-accounts-malware</a></p><p><a href="https://www.cybersecuritydive.com/news/cyber-business-risk-us-globally/737447/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cyber-business-risk-us-globally/737447/</a></p><p><a href="https://www.securityweek.com/biden-executive-order-aims-to-shore-up-us-cyber-defenses/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/biden-executive-order-aims-to-shore-up-us-cyber-defenses/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ 585 Healthcare Data Breaches in 2024, 15K Fortinet Firewall Data Leaked, Business Risk Concerns Raise due to Cybersecurity</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as 585 Healthcare Data Breaches in 2024 with more news below:</p><p>• CISA Warns of Second Beyondtrust Flaw &nbsp;&nbsp;</p><p>• GoDaddy Targeted by FTC</p><p>• CISA vs SEC for Incident Response &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/2024-us-healthcare-data-breaches-585-incidents-180-million-compromised-user-records/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/2024-us-healthcare-data-breaches-585-incidents-180-million-compromised-user-records/</a></p><p><a href="https://www.securityweek.com/data-from-15000-fortinet-firewalls-leaked-by-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/data-from-15000-fortinet-firewalls-leaked-by-hackers/</a></p><p><a href="https://therecord.media/ftc-godaddy-cyber-failings-fine" rel="noopener noreferrer" target="_blank">https://therecord.media/ftc-godaddy-cyber-failings-fine</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-critical-vulnerabilities-in-netweaver-application-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sap-fixes-critical-vulnerabilities-in-netweaver-application-servers/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/cisa-warns-of-second-vuln-found-in-beyondtrust-breach-investigation" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/cisa-warns-of-second-vuln-found-in-beyondtrust-breach-investigation</a></p><p><a href="https://therecord.media/cyber-incident-reporting-sec-circia-cisa-easterly" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-incident-reporting-sec-circia-cisa-easterly</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/attackers-hijack-google-advertiser-accounts-malware" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/attackers-hijack-google-advertiser-accounts-malware</a></p><p><a href="https://www.cybersecuritydive.com/news/cyber-business-risk-us-globally/737447/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cyber-business-risk-us-globally/737447/</a></p><p><a href="https://www.securityweek.com/biden-executive-order-aims-to-shore-up-us-cyber-defenses/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/biden-executive-order-aims-to-shore-up-us-cyber-defenses/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8c760354-f79e-4354-a52a-0ad8b25cfe66</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 16 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1b76717d-c60a-450d-9219-915adc65ec02/585-Healthcare-Data-Breaches-in-2024-15K-Fortinet-Firewall-Data.mp3" length="28743443" type="audio/mpeg"/><itunes:duration>19:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>846</itunes:episode><podcast:episode>846</podcast:episode></item><item><title>FBI Deletes Chinese Malware from US Devices, Microsoft Patch Tuesday, Fortinet Zeroday, Crypto Heists</title><itunes:title>FBI Deletes Chinese Malware from US Devices, Microsoft Patch Tuesday, Fortinet Zeroday, Crypto Heists</itunes:title><description><![CDATA[<p>🎙️ FBI Deletes Chinese Malware from US Devices, Microsoft Patch Tuesday, Fortinet Zeroday, Crypto Heists</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as FBI Deletes Chinese Malware from Thousands of US Devices with more news below:</p><p>• Nvidia Patches Vulnerabilities &nbsp;&nbsp;</p><p>• ICS Patch Tuesday</p><p>• $660 Crypto Stolen by North Korea &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-deletes-chinese-plugx-malware-from-thousands-of-us-computers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-deletes-chinese-plugx-malware-from-thousands-of-us-computers/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2025-patch-tuesday-fixes-8-zero-days-159-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2025-patch-tuesday-fixes-8-zero-days-159-flaws/</a></p><p><a href="https://www.securityweek.com/fortinet-confirms-new-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-confirms-new-zero-day-exploitation/</a></p><p><a href="https://www.securityweek.com/nvidia-zoom-zyxel-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-zoom-zyxel-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-critical-vulnerabilities-in-endpoint-manager-2/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-critical-vulnerabilities-in-endpoint-manager-2/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-published-by-schneider-siemens-phoenix-contact-cisa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-published-by-schneider-siemens-phoenix-contact-cisa/</a></p><p><a href="https://www.wsj.com/articles/asset-manager-ashford-settles-sec-allegations-it-failed-to-disclose-extent-of-hack-dafec329?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/asset-manager-ashford-settles-sec-allegations-it-failed-to-disclose-extent-of-hack-dafec329?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/us-japan-south-korea-blame-north-korean-hackers-for-660m-crypto-heists/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-japan-south-korea-blame-north-korean-hackers-for-660m-crypto-heists/</a></p><p><a href="https://www.darkreading.com/cyber-risk/as-tensions-with-china-mount-taiwan-sees-surge-in-cyberattacks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/as-tensions-with-china-mount-taiwan-sees-surge-in-cyberattacks</a></p><p><a href="https://therecord.media/poland-uncovers-russia-linked-disinformation-campaign-presidential-election" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-uncovers-russia-linked-disinformation-campaign-presidential-election</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ FBI Deletes Chinese Malware from US Devices, Microsoft Patch Tuesday, Fortinet Zeroday, Crypto Heists</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as FBI Deletes Chinese Malware from Thousands of US Devices with more news below:</p><p>• Nvidia Patches Vulnerabilities &nbsp;&nbsp;</p><p>• ICS Patch Tuesday</p><p>• $660 Crypto Stolen by North Korea &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-deletes-chinese-plugx-malware-from-thousands-of-us-computers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-deletes-chinese-plugx-malware-from-thousands-of-us-computers/</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2025-patch-tuesday-fixes-8-zero-days-159-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2025-patch-tuesday-fixes-8-zero-days-159-flaws/</a></p><p><a href="https://www.securityweek.com/fortinet-confirms-new-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-confirms-new-zero-day-exploitation/</a></p><p><a href="https://www.securityweek.com/nvidia-zoom-zyxel-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nvidia-zoom-zyxel-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-critical-vulnerabilities-in-endpoint-manager-2/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-critical-vulnerabilities-in-endpoint-manager-2/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-published-by-schneider-siemens-phoenix-contact-cisa/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-published-by-schneider-siemens-phoenix-contact-cisa/</a></p><p><a href="https://www.wsj.com/articles/asset-manager-ashford-settles-sec-allegations-it-failed-to-disclose-extent-of-hack-dafec329?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/asset-manager-ashford-settles-sec-allegations-it-failed-to-disclose-extent-of-hack-dafec329?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/us-japan-south-korea-blame-north-korean-hackers-for-660m-crypto-heists/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-japan-south-korea-blame-north-korean-hackers-for-660m-crypto-heists/</a></p><p><a href="https://www.darkreading.com/cyber-risk/as-tensions-with-china-mount-taiwan-sees-surge-in-cyberattacks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/as-tensions-with-china-mount-taiwan-sees-surge-in-cyberattacks</a></p><p><a href="https://therecord.media/poland-uncovers-russia-linked-disinformation-campaign-presidential-election" rel="noopener noreferrer" target="_blank">https://therecord.media/poland-uncovers-russia-linked-disinformation-campaign-presidential-election</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">16223fa4-cd50-4446-984d-7d83859e3dea</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 15 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/34ac8859-d2c7-48d2-97d6-7c9036454c97/FBI-Deletes-Chinese-Malware-from-US-Devices-Microsoft-Patch-Tue.mp3" length="31527051" type="audio/mpeg"/><itunes:duration>21:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>845</itunes:episode><podcast:episode>845</podcast:episode></item><item><title>Aviatrix Controller Exploited, Domain Registry Nominet Breached, Crack Down on AI CoPilot Use, Tiktok Ban</title><itunes:title>Aviatrix Controller Exploited, Domain Registry Nominet Breached, Crack Down on AI CoPilot Use, Tiktok Ban</itunes:title><description><![CDATA[<p>🎙️ Aviatrix Controller Exploited, Domain Registry Nominet Breached, Crack Down on AI CoPilot Use, Tiktok Ban</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Aviatrix Controller Exploited in the Cloud with more news below:</p><p>• US to Ban Russian and Chinese Components</p><p>• Fancy Bear Hits Kazakhstan</p><p>• Texas Sues AllState for Privacy Violation</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/critical-aviatrix-controller-vulnerability-exploited-against-cloud-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-aviatrix-controller-vulnerability-exploited-against-cloud-environments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/</a></p><p><a href="https://www.wsj.com/business/autos/u-s-to-ban-chinese-russian-components-in-connected-vehicles-ab030036?mod=latest_headlines" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/autos/u-s-to-ban-chinese-russian-components-in-connected-vehicles-ab030036?mod=latest_headlines</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/</a></p><p><a href="https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/</a></p><p><a href="https://www.darkreading.com/application-security/microsoft-cracks-down-malicious-copilot-ai-use" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/microsoft-cracks-down-malicious-copilot-ai-use</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-beyondtrust-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-beyondtrust-bug-exploited-in-attacks/</a></p><p><a href="https://therecord.media/texas-sues-allstate-data-privacy-cars" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-sues-allstate-data-privacy-cars</a></p><p><a href="https://www.wsj.com/tech/china-officials-internally-discuss-option-of-tiktok-sale-to-musk-bac0a224?mod=hp_lead_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/china-officials-internally-discuss-option-of-tiktok-sale-to-musk-bac0a224?mod=hp_lead_pos3</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Aviatrix Controller Exploited, Domain Registry Nominet Breached, Crack Down on AI CoPilot Use, Tiktok Ban</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Aviatrix Controller Exploited in the Cloud with more news below:</p><p>• US to Ban Russian and Chinese Components</p><p>• Fancy Bear Hits Kazakhstan</p><p>• Texas Sues AllState for Privacy Violation</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>&nbsp;</p><p><strong>👀 SHOW Supporters:</strong></p><p>Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at&nbsp;<a href="https://www.nudgesecurity.com/cyberhub" rel="noopener noreferrer" target="_blank">https://www.nudgesecurity.com/cyberhub</a></p><p>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/critical-aviatrix-controller-vulnerability-exploited-against-cloud-environments/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-aviatrix-controller-vulnerability-exploited-against-cloud-environments/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/</a></p><p><a href="https://www.wsj.com/business/autos/u-s-to-ban-chinese-russian-components-in-connected-vehicles-ab030036?mod=latest_headlines" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/autos/u-s-to-ban-chinese-russian-components-in-connected-vehicles-ab030036?mod=latest_headlines</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/</a></p><p><a href="https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/</a></p><p><a href="https://www.darkreading.com/application-security/microsoft-cracks-down-malicious-copilot-ai-use" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/microsoft-cracks-down-malicious-copilot-ai-use</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-beyondtrust-bug-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-beyondtrust-bug-exploited-in-attacks/</a></p><p><a href="https://therecord.media/texas-sues-allstate-data-privacy-cars" rel="noopener noreferrer" target="_blank">https://therecord.media/texas-sues-allstate-data-privacy-cars</a></p><p><a href="https://www.wsj.com/tech/china-officials-internally-discuss-option-of-tiktok-sale-to-musk-bac0a224?mod=hp_lead_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/china-officials-internally-discuss-option-of-tiktok-sale-to-musk-bac0a224?mod=hp_lead_pos3</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1d87ef54-1aa2-4f4e-b938-f2866fd38680</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 14 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/45161a9a-2c0a-44dd-8098-cdcfda8c6e28/Aviatrix-Controller-Exploited-Domain-Registry-Nominet-Breached-.mp3" length="26747270" type="audio/mpeg"/><itunes:duration>18:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>844</itunes:episode><podcast:episode>844</podcast:episode></item><item><title>Ivanti Zeroday Abused by China, US Foreign Investment Review Breached, TikTok Ban Looms, &amp; More Cyber news</title><itunes:title>Ivanti Zeroday Abused by China, US Foreign Investment Review Breached, TikTok Ban Looms, &amp; More Cyber news</itunes:title><description><![CDATA[<p>Ivanti Zeroday Abused by China, US Foreign Investment Review Breached, TikTok Ban Looms</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Ivanti Zeroday abused by China with more news below:</p><p>• China Hacks US Foreign Investment Review</p><p>• Tik Tok Ban Looms</p><p>• Paypal Phishing &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/treasury-hackers-also-breached-us-foreign-investments-review-office/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/treasury-hackers-also-breached-us-foreign-investments-review-office/</a></p><p><a href="https://www.securityweek.com/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/</a></p><p><a href="https://www.wsj.com/us-news/law/tiktok-ban-supreme-court-hearing-9b19b618?mod=tech_lead_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/us-news/law/tiktok-ban-supreme-court-hearing-9b19b618?mod=tech_lead_pos3</a></p><p><a href="https://www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/crowdstrike-job-interviews-hacker-tactic" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/crowdstrike-job-interviews-hacker-tactic</a></p><p><a href="https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/</a></p><p><a href="https://therecord.media/marijuana-dispensary-warns-of-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/marijuana-dispensary-warns-of-data-breach</a></p><p><a href="https://cyberscoop.com/cisa-cyber-hygiene-critical-infrastructure-report/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/cisa-cyber-hygiene-critical-infrastructure-report/</a></p><p><a href="https://therecord.media/russian-nationals-indicted-blender-sinbad-crypto-mixers" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-nationals-indicted-blender-sinbad-crypto-mixers</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=shar</a>e</p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Ivanti Zeroday Abused by China, US Foreign Investment Review Breached, TikTok Ban Looms</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Ivanti Zeroday abused by China with more news below:</p><p>• China Hacks US Foreign Investment Review</p><p>• Tik Tok Ban Looms</p><p>• Paypal Phishing &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/treasury-hackers-also-breached-us-foreign-investments-review-office/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/treasury-hackers-also-breached-us-foreign-investments-review-office/</a></p><p><a href="https://www.securityweek.com/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/</a></p><p><a href="https://www.wsj.com/us-news/law/tiktok-ban-supreme-court-hearing-9b19b618?mod=tech_lead_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/us-news/law/tiktok-ban-supreme-court-hearing-9b19b618?mod=tech_lead_pos3</a></p><p><a href="https://www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/paypal-phishing-campaign-employs-genuine-links-to-take-over-accounts/</a></p><p><a href="https://www.darkreading.com/threat-intelligence/crowdstrike-job-interviews-hacker-tactic" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/crowdstrike-job-interviews-hacker-tactic</a></p><p><a href="https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/</a></p><p><a href="https://therecord.media/marijuana-dispensary-warns-of-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/marijuana-dispensary-warns-of-data-breach</a></p><p><a href="https://cyberscoop.com/cisa-cyber-hygiene-critical-infrastructure-report/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/cisa-cyber-hygiene-critical-infrastructure-report/</a></p><p><a href="https://therecord.media/russian-nationals-indicted-blender-sinbad-crypto-mixers" rel="noopener noreferrer" target="_blank">https://therecord.media/russian-nationals-indicted-blender-sinbad-crypto-mixers</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=shar</a>e</p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">bbd334e6-4e1b-4951-b93b-5ad466814059</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 13 Jan 2025 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9102d6a2-e4e5-42b9-a2f3-251163ae869a/Ivanti-Zeroday-Abused-by-China-US-Foreign-Investment-Review-Bre.mp3" length="24845765" type="audio/mpeg"/><itunes:duration>17:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>843</itunes:episode><podcast:episode>843</podcast:episode></item><item><title>Another Ivanti Zero Day, Russian ISP Network Destroyed, Green Bay Packers Store Hacked, CyberHaven Breach</title><itunes:title>Another Ivanti Zero Day, Russian ISP Network Destroyed, Green Bay Packers Store Hacked, CyberHaven Breach</itunes:title><description><![CDATA[<p>🎙️ Another Ivanti Zero Day, Russian ISP Network Destroyed, Green Bay Packers Store Hacked, CyberHaven Breach</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Another Ivanti Zero Day with more news below:</p><p>• Palo Alto Networks Patches Retired Migration tool</p><p>• Japan Links China to MirrorFace</p><p>• Jaime Blasco Joins the show to talk Cyberhaven Breach &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/green-bay-packers-online-pro-shop-payment-skimmer" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/green-bay-packers-online-pro-shop-payment-skimmer</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/</a></p><p><a href="https://www.securityweek.com/japan-links-chinese-hacker-mirrorface-to-dozens-of-cyberattacks-targeting-security-and-tech-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-links-chinese-hacker-mirrorface-to-dozens-of-cyberattacks-targeting-security-and-tech-data/</a></p><p><a href="https://therecord.media/cyber-command-overhaul-secdef-approval" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-overhaul-secdef-approval</a></p><p><a href="https://therecord.media/lawmakers-expected-to-push-for-cyber-force-study" rel="noopener noreferrer" target="_blank">https://therecord.media/lawmakers-expected-to-push-for-cyber-force-study</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Another Ivanti Zero Day, Russian ISP Network Destroyed, Green Bay Packers Store Hacked, CyberHaven Breach</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Another Ivanti Zero Day with more news below:</p><p>• Palo Alto Networks Patches Retired Migration tool</p><p>• Japan Links China to MirrorFace</p><p>• Jaime Blasco Joins the show to talk Cyberhaven Breach &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/green-bay-packers-online-pro-shop-payment-skimmer" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/green-bay-packers-online-pro-shop-payment-skimmer</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/</a></p><p><a href="https://www.securityweek.com/japan-links-chinese-hacker-mirrorface-to-dozens-of-cyberattacks-targeting-security-and-tech-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-links-chinese-hacker-mirrorface-to-dozens-of-cyberattacks-targeting-security-and-tech-data/</a></p><p><a href="https://therecord.media/cyber-command-overhaul-secdef-approval" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-overhaul-secdef-approval</a></p><p><a href="https://therecord.media/lawmakers-expected-to-push-for-cyber-force-study" rel="noopener noreferrer" target="_blank">https://therecord.media/lawmakers-expected-to-push-for-cyber-force-study</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">aa0056bc-fb73-48ac-9d38-61cd529e7681</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 09 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/af78bbc8-2f34-4c85-b4ce-fee9dd94588b/Ivanti-Zero-Day-Russian-ISP-Network-Destroyed-Green-Bay-Packers.mp3" length="31164681" type="audio/mpeg"/><itunes:duration>21:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>842</itunes:episode><podcast:episode>842</podcast:episode></item><item><title>Telecom Ransomware Attack, UN Data Breach, Cybersecurity Safety Label Launch, Telegram Caves In</title><itunes:title>Telecom Ransomware Attack, UN Data Breach, Cybersecurity Safety Label Launch, Telegram Caves In</itunes:title><description><![CDATA[<p>Telecom Ransomware Attack, UN Data Breach, Cybersecurity Safety Label Launch, Telegram Caves In</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Telegram Caves in to Government pressure with more news below:</p><p>• Teleco Ransomware Attack &nbsp;&nbsp;&nbsp;&nbsp;</p><p>• Oracle &amp; Mitel Flaws &nbsp;&nbsp;&nbsp;</p><p>• Android January Security Update &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/ransomware-targeting-infrastructure-telecom-namibia" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/ransomware-targeting-infrastructure-telecom-namibia</a></p><p><a href="https://therecord.media/icao-un-confirms-recruitment-systems-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/icao-un-confirms-recruitment-systems-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-launches-cybersecurity-safety-label-for-smart-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-govt-launches-cybersecurity-safety-label-for-smart-devices/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-oracle-mitel-flaws-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-oracle-mitel-flaws-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-targets-industrial-routers-with-zero-day-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-mirai-botnet-targets-industrial-routers-with-zero-day-exploits/</a></p><p><a href="https://www.securityweek.com/chrome-131-firefox-134-updates-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-131-firefox-134-updates-patch-high-severity-vulnerabilities/</a></p><p><a href="https://cyberscoop.com/android-security-update-january-2025/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/android-security-update-january-2025/</a></p><p><a href="https://www.ylventures.com/wp-content/uploads/2025/01/The-State-of-the-Cyber-Nation-2024_Full-Report_v8.pdf" rel="noopener noreferrer" target="_blank">https://www.ylventures.com/wp-content/uploads/2025/01/The-State-of-the-Cyber-Nation-2024_Full-Report_v8.pdf</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Telecom Ransomware Attack, UN Data Breach, Cybersecurity Safety Label Launch, Telegram Caves In</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Telegram Caves in to Government pressure with more news below:</p><p>• Teleco Ransomware Attack &nbsp;&nbsp;&nbsp;&nbsp;</p><p>• Oracle &amp; Mitel Flaws &nbsp;&nbsp;&nbsp;</p><p>• Android January Security Update &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/ransomware-targeting-infrastructure-telecom-namibia" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/ransomware-targeting-infrastructure-telecom-namibia</a></p><p><a href="https://therecord.media/icao-un-confirms-recruitment-systems-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/icao-un-confirms-recruitment-systems-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-launches-cybersecurity-safety-label-for-smart-devices/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-govt-launches-cybersecurity-safety-label-for-smart-devices/</a></p><p><a href="https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-oracle-mitel-flaws-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-oracle-mitel-flaws-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-targets-industrial-routers-with-zero-day-exploits/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-mirai-botnet-targets-industrial-routers-with-zero-day-exploits/</a></p><p><a href="https://www.securityweek.com/chrome-131-firefox-134-updates-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-131-firefox-134-updates-patch-high-severity-vulnerabilities/</a></p><p><a href="https://cyberscoop.com/android-security-update-january-2025/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/android-security-update-january-2025/</a></p><p><a href="https://www.ylventures.com/wp-content/uploads/2025/01/The-State-of-the-Cyber-Nation-2024_Full-Report_v8.pdf" rel="noopener noreferrer" target="_blank">https://www.ylventures.com/wp-content/uploads/2025/01/The-State-of-the-Cyber-Nation-2024_Full-Report_v8.pdf</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d6a2fefa-8361-4dcc-8169-a482237f4c89</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 08 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8318db2c-f40d-4dd8-8dc4-29aed3182117/Telecom-Ransomware-Attack-UN-Data-Breach-Cybersecurity-Safety-L.mp3" length="25786800" type="audio/mpeg"/><itunes:duration>17:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>841</itunes:episode><podcast:episode>841</podcast:episode></item><item><title>🎙️ Salt Typhoon Victims Stack up, Over 2000 Critical Infrastructure Ransomware Incidents, Patch Now</title><itunes:title>🎙️ Salt Typhoon Victims Stack up, Over 2000 Critical Infrastructure Ransomware Incidents, Patch Now</itunes:title><description><![CDATA[<p>🎙️ Salt Typhoon Victims Stack up, Over 2000 Critical Infrastructure Ransomware Incidents, Patch Now &nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as more victims come forward as Salt Typhoon breach expands with more news below:</p><p>• China Denies Role in Hacking &nbsp;&nbsp;&nbsp;</p><p>• US Treasury Breach is limited &nbsp;&nbsp;</p><p>• Dell, HPE, MediaTek Patch Vulnerabilities &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/charter-and-windstream-among-nine-us-telecoms-hacked-by-china/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/charter-and-windstream-among-nine-us-telecoms-hacked-by-china/</a></p><p><a href="https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/</a></p><p><a href="https://www.securityweek.com/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-recent-government-hack-limited-to-us-treasury/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-recent-government-hack-limited-to-us-treasury/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vulnerable-moxa-devices-expose-industrial-networks-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vulnerable-moxa-devices-expose-industrial-networks-to-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/eagerbee-backdoor-middle-east-isps-government-targets" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/eagerbee-backdoor-middle-east-isps-government-targets</a></p><p><a href="https://www.securityweek.com/dell-hpe-mediatek-patch-vulnerabilities-in-their-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dell-hpe-mediatek-patch-vulnerabilities-in-their-products/</a></p><p><a href="https://www.securityweek.com/washington-attorney-general-sues-t-mobile-over-2021-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-attorney-general-sues-t-mobile-over-2021-data-breach/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ Salt Typhoon Victims Stack up, Over 2000 Critical Infrastructure Ransomware Incidents, Patch Now &nbsp;</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as more victims come forward as Salt Typhoon breach expands with more news below:</p><p>• China Denies Role in Hacking &nbsp;&nbsp;&nbsp;</p><p>• US Treasury Breach is limited &nbsp;&nbsp;</p><p>• Dell, HPE, MediaTek Patch Vulnerabilities &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/charter-and-windstream-among-nine-us-telecoms-hacked-by-china/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/charter-and-windstream-among-nine-us-telecoms-hacked-by-china/</a></p><p><a href="https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/</a></p><p><a href="https://www.securityweek.com/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-recent-government-hack-limited-to-us-treasury/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-recent-government-hack-limited-to-us-treasury/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/vulnerable-moxa-devices-expose-industrial-networks-to-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/vulnerable-moxa-devices-expose-industrial-networks-to-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/eagerbee-backdoor-middle-east-isps-government-targets" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/eagerbee-backdoor-middle-east-isps-government-targets</a></p><p><a href="https://www.securityweek.com/dell-hpe-mediatek-patch-vulnerabilities-in-their-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/dell-hpe-mediatek-patch-vulnerabilities-in-their-products/</a></p><p><a href="https://www.securityweek.com/washington-attorney-general-sues-t-mobile-over-2021-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/washington-attorney-general-sues-t-mobile-over-2021-data-breach/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cbed41a3-8955-4747-be82-70192d42eb75</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 07 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1cdc2199-dced-4d7a-a958-11ed9028b522/Salt-Typhoon-Victims-Stack-up-Over-2000-Critical-Infrastructure.mp3" length="25687744" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>840</itunes:episode><podcast:episode>840</podcast:episode></item><item><title>We Remember Amit Yoran, Chinese Cybersecurity Threats to the US, Atos Data Theft Claims, Apple Fine</title><itunes:title>We Remember Amit Yoran, Chinese Cybersecurity Threats to the US, Atos Data Theft Claims, Apple Fine</itunes:title><description><![CDATA[<p>🎙️ We Remember Amit Yoran, Chinese Cybersecurity Threats to the US, Atos Data Theft Claims, Apple Fine</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Iran’s back to the wall with more news below:</p><p>• Salt Typhoon Fallout &nbsp;&nbsp;</p><p>• Palo Alto Networks Pan-OS &nbsp;</p><p>• Securing Water Systems</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://cyberscoop.com/amit-yoran-tenable-dies/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/amit-yoran-tenable-dies/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bloomberg.com/news/features/2025-01-03/chinese-cyber-hackers-terrify-us-intelligence-after-infiltrating-guam?srnd=phx-businessweek&amp;leadSource=uverify%20wall" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/features/2025-01-03/chinese-cyber-hackers-terrify-us-intelligence-after-infiltrating-guam?srnd=phx-businessweek&amp;leadSource=uverify%20wall</a></p><p><a href="https://www.securityweek.com/us-sanctions-chinese-firm-linked-to-flax-typhoon-attacks-on-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-sanctions-chinese-firm-linked-to-flax-typhoon-attacks-on-critical-infrastructure/</a></p><p><a href="https://www.securityweek.com/it-giant-atos-responds-to-ransomware-groups-data-theft-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/it-giant-atos-responds-to-ransomware-groups-data-theft-claims/</a></p><p><a href="https://www.cybersecuritydive.com/news/Censys-warns-8600-exposed-beyondtrust/736416/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/Censys-warns-8600-exposed-beyondtrust/736416/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cryptocurrency-wallet-drainers-stole-494-million-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cryptocurrency-wallet-drainers-stole-494-million-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches</a></p><p><a href="https://thecyberexpress.com/india-releases-draft-data-protection-rules/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/india-releases-draft-data-protection-rules/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;<strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🎙️ We Remember Amit Yoran, Chinese Cybersecurity Threats to the US, Atos Data Theft Claims, Apple Fine</p><p>🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Iran’s back to the wall with more news below:</p><p>• Salt Typhoon Fallout &nbsp;&nbsp;</p><p>• Palo Alto Networks Pan-OS &nbsp;</p><p>• Securing Water Systems</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://cyberscoop.com/amit-yoran-tenable-dies/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/amit-yoran-tenable-dies/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bloomberg.com/news/features/2025-01-03/chinese-cyber-hackers-terrify-us-intelligence-after-infiltrating-guam?srnd=phx-businessweek&amp;leadSource=uverify%20wall" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/features/2025-01-03/chinese-cyber-hackers-terrify-us-intelligence-after-infiltrating-guam?srnd=phx-businessweek&amp;leadSource=uverify%20wall</a></p><p><a href="https://www.securityweek.com/us-sanctions-chinese-firm-linked-to-flax-typhoon-attacks-on-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-sanctions-chinese-firm-linked-to-flax-typhoon-attacks-on-critical-infrastructure/</a></p><p><a href="https://www.securityweek.com/it-giant-atos-responds-to-ransomware-groups-data-theft-claims/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/it-giant-atos-responds-to-ransomware-groups-data-theft-claims/</a></p><p><a href="https://www.cybersecuritydive.com/news/Censys-warns-8600-exposed-beyondtrust/736416/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/Censys-warns-8600-exposed-beyondtrust/736416/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cryptocurrency-wallet-drainers-stole-494-million-in-2024/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cryptocurrency-wallet-drainers-stole-494-million-in-2024/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/hipaa-security-rules-pull-no-punches</a></p><p><a href="https://thecyberexpress.com/india-releases-draft-data-protection-rules/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/india-releases-draft-data-protection-rules/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>🚨 Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>🤝 For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>🚀 <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;<strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ef2de955-16d0-44c3-8eaa-32fc1a400d89</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 06 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1827028a-f249-4b23-9aab-13f986115c92/We-Remember-Amit-Yoran-Chinese-Cybersecurity-Threats-to-the-US-.mp3" length="27200547" type="audio/mpeg"/><itunes:duration>18:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>839</itunes:episode><podcast:episode>839</podcast:episode></item><item><title>Iran &amp; Turkey on a Collision Course, Salt Typhoon Fallout Continues, Securing Water Systems, KEV Update</title><itunes:title>Iran &amp; Turkey on a Collision Course, Salt Typhoon Fallout Continues, Securing Water Systems, KEV Update</itunes:title><description><![CDATA[<p>🚨 Iran &amp; Turkey on a Collision Course, Salt Typhoon Fallout Continues, Securing Water Systems, KEV Update</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Iran’s back to the wall with more news below:</p><p>• Salt Typhoon Fallout &nbsp;&nbsp;</p><p>• Palo Alto Networks Pan-OS &nbsp;</p><p>• Securing Water Systems</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html</a></p><p><a href="https://thecyberexpress.com/pan-os-versions-vulnerability-added-to-cisas/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/pan-os-versions-vulnerability-added-to-cisas/</a></p><p><a href="https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html</a></p><p><a href="https://www.cybersecuritydive.com/news/pennsylvania-rep-bill-cyber-water/735773/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/pennsylvania-rep-bill-cyber-water/735773/</a></p><p><a href="https://www.wsj.com/economy/jobs/the-visas-dividing-maga-world-help-power-the-u-s-tech-industry-93b77afe?mod=hp_lista_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/economy/jobs/the-visas-dividing-maga-world-help-power-the-u-s-tech-industry-93b77afe?mod=hp_lista_pos3</a></p><p><a href="https://cyberscoop.com/us-telecom-infrastructure-chinese-cyberattack-salt-typhoon-security-strategy/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/us-telecom-infrastructure-chinese-cyberattack-salt-typhoon-security-strategy/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-mobile-security-advice/736048/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-mobile-security-advice/736048/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Iran &amp; Turkey on a Collision Course, Salt Typhoon Fallout Continues, Securing Water Systems, KEV Update</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Iran’s back to the wall with more news below:</p><p>• Salt Typhoon Fallout &nbsp;&nbsp;</p><p>• Palo Alto Networks Pan-OS &nbsp;</p><p>• Securing Water Systems</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html</a></p><p><a href="https://thecyberexpress.com/pan-os-versions-vulnerability-added-to-cisas/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/pan-os-versions-vulnerability-added-to-cisas/</a></p><p><a href="https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html</a></p><p><a href="https://www.cybersecuritydive.com/news/pennsylvania-rep-bill-cyber-water/735773/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/pennsylvania-rep-bill-cyber-water/735773/</a></p><p><a href="https://www.wsj.com/economy/jobs/the-visas-dividing-maga-world-help-power-the-u-s-tech-industry-93b77afe?mod=hp_lista_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/economy/jobs/the-visas-dividing-maga-world-help-power-the-u-s-tech-industry-93b77afe?mod=hp_lista_pos3</a></p><p><a href="https://cyberscoop.com/us-telecom-infrastructure-chinese-cyberattack-salt-typhoon-security-strategy/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/us-telecom-infrastructure-chinese-cyberattack-salt-typhoon-security-strategy/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-mobile-security-advice/736048/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-mobile-security-advice/736048/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">27803818-a482-4b42-866c-83e735012934</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 02 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b4852d0e-3a36-43a7-be67-5bfa00e4973e/Iran-Turkey-on-a-Collision-Course-Salt-Typhoon-Fallout-Securing.mp3" length="29487620" type="audio/mpeg"/><itunes:duration>20:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>838</itunes:episode><podcast:episode>838</podcast:episode></item><item><title>US Army Solider Arrested for Snowflake Extortion, Rhode Island Data Leaked, UN Cybercrime Treaty Next Steps, Iran &amp; Russia Sanctions</title><itunes:title>US Army Solider Arrested for Snowflake Extortion, Rhode Island Data Leaked, UN Cybercrime Treaty Next Steps, Iran &amp; Russia Sanctions</itunes:title><description><![CDATA[<p>🚨 US Army Solider Arrested for Snowflake Extortion, Rhode Island Data Leaked, UN Cybercrime Treaty Next Steps, Iran &amp; Russia Sanctions</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Army Solider Arrested for Snowflake Extortion with more news below:</p><p>• Rhode Island Data Leaked &nbsp;</p><p>• Iran &amp; Russia Sanctioned for Election Interference</p><p>• SEC Disclosure uptick</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/arrest-us-army-soldier-tied-to-att-verizon-extortion-a-27192" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/arrest-us-army-soldier-tied-to-att-verizon-extortion-a-27192</a></p><p><a href="https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/</a></p><p><a href="https://cyberscoop.com/after-un-adoption-controversial-cybercrime-treatys-next-steps-could-prove-vital/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/after-un-adoption-controversial-cybercrime-treatys-next-steps-could-prove-vital/</a></p><p><a href="https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/</a></p><p><a href="https://cyberscoop.com/sec-cybersecurity-disclosure-uptick-paul-hastings/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/sec-cybersecurity-disclosure-uptick-paul-hastings/</a></p><p><a href="https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 US Army Solider Arrested for Snowflake Extortion, Rhode Island Data Leaked, UN Cybercrime Treaty Next Steps, Iran &amp; Russia Sanctions</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Army Solider Arrested for Snowflake Extortion with more news below:</p><p>• Rhode Island Data Leaked &nbsp;</p><p>• Iran &amp; Russia Sanctioned for Election Interference</p><p>• SEC Disclosure uptick</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bankinfosecurity.com/arrest-us-army-soldier-tied-to-att-verizon-extortion-a-27192" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/arrest-us-army-soldier-tied-to-att-verizon-extortion-a-27192</a></p><p><a href="https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/</a></p><p><a href="https://cyberscoop.com/after-un-adoption-controversial-cybercrime-treatys-next-steps-could-prove-vital/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/after-un-adoption-controversial-cybercrime-treatys-next-steps-could-prove-vital/</a></p><p><a href="https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/</a></p><p><a href="https://cyberscoop.com/sec-cybersecurity-disclosure-uptick-paul-hastings/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/sec-cybersecurity-disclosure-uptick-paul-hastings/</a></p><p><a href="https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">726022a0-1b39-4adf-8372-a1fb0489b2fe</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 01 Jan 2025 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/766feb1b-b8a2-406a-9bbf-69a7788274c9/US-Army-Solider-Arrested-for-Snowflake-Extortion-Rhode-Island-D.mp3" length="32261197" type="audio/mpeg"/><itunes:duration>22:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>837</itunes:episode><podcast:episode>837</podcast:episode></item><item><title>Chinese Attackers Hack US Treasury Workstations, Cyberhaven supply Chain Campaign, Water Cyber Attacks</title><itunes:title>Chinese Attackers Hack US Treasury Workstations, Cyberhaven supply Chain Campaign, Water Cyber Attacks</itunes:title><description><![CDATA[<p>🚨 Chinese Attackers Hack US Treasury Workstations, Cyberhaven supply Chain Campaign, Water Cyber Attacks</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Chinese attackers hack US Treasury with more news below:</p><p>• Volkswagen subsidiary exposes data &nbsp;</p><p>• Microsoft issues .net installer link</p><p>• Germany Charges three spies espionage</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-accessed-us-treasury-workstations-in-major-cybersecurity-incident/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-accessed-us-treasury-workstations-in-major-cybersecurity-incident/</a></p><p><a href="https://www.securityweek.com/cyberhaven-chrome-extension-hack-linked-to-widening-supply-chain-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberhaven-chrome-extension-hack-linked-to-widening-supply-chain-campaign/</a></p><p><a href="https://www.bankinfosecurity.com/volkswagen-subsidiary-exposed-data-800000-cars-online-a-27174" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/volkswagen-subsidiary-exposed-data-800000-cars-online-a-27174</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/</a></p><p><a href="https://thecyberexpress.com/cve-2024-43441-vulnerability-in-apache/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2024-43441-vulnerability-in-apache/</a></p><p><a href="https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html</a></p><p><a href="https://www.darkreading.com/ics-ot-security/hackers-hot-water-utilities" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/hackers-hot-water-utilities</a></p><p><a href="https://therecord.media/germany-charges-three-spies-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-charges-three-spies-espionage</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Chinese Attackers Hack US Treasury Workstations, Cyberhaven supply Chain Campaign, Water Cyber Attacks</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Chinese attackers hack US Treasury with more news below:</p><p>• Volkswagen subsidiary exposes data &nbsp;</p><p>• Microsoft issues .net installer link</p><p>• Germany Charges three spies espionage</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/chinese-hackers-accessed-us-treasury-workstations-in-major-cybersecurity-incident/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-accessed-us-treasury-workstations-in-major-cybersecurity-incident/</a></p><p><a href="https://www.securityweek.com/cyberhaven-chrome-extension-hack-linked-to-widening-supply-chain-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberhaven-chrome-extension-hack-linked-to-widening-supply-chain-campaign/</a></p><p><a href="https://www.bankinfosecurity.com/volkswagen-subsidiary-exposed-data-800000-cars-online-a-27174" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/volkswagen-subsidiary-exposed-data-800000-cars-online-a-27174</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/</a></p><p><a href="https://thecyberexpress.com/cve-2024-43441-vulnerability-in-apache/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/cve-2024-43441-vulnerability-in-apache/</a></p><p><a href="https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html</a></p><p><a href="https://www.darkreading.com/ics-ot-security/hackers-hot-water-utilities" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot-security/hackers-hot-water-utilities</a></p><p><a href="https://therecord.media/germany-charges-three-spies-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/germany-charges-three-spies-espionage</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">be7c28f0-0197-4692-88c9-a218c1489cb0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 31 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6c6b3b6-f8e6-4592-ae2d-0751ce3c3181/Chinese-Hack-US-Treasury-Workstations-Cyberhaven-supply-Chain-C.mp3" length="26752286" type="audio/mpeg"/><itunes:duration>18:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>836</itunes:episode><podcast:episode>836</podcast:episode></item><item><title>Ninth Salt Typhoon Victim Identified, HIPPA Security Rule Update, Cyberhaven Hack, Zagg Breach</title><itunes:title>Ninth Salt Typhoon Victim Identified, HIPPA Security Rule Update, Cyberhaven Hack, Zagg Breach</itunes:title><description><![CDATA[<p>🚨 Ninth Salt Typhoon Victim Identified, HIPPA Security Rule Update, Cyberhaven Hack, Zagg Breach</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Ninth Salt Typhoon victim identified with more news below:</p><p>• DOJ Protect Data Rule &nbsp;</p><p>• Cyberhaven Hack &nbsp;</p><p>• Palo Alto Networks patches firewall zeroday</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/nine-us-companies-hacked-salt-typhoon-china-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/nine-us-companies-hacked-salt-typhoon-china-espionage</a></p><p><a href="https://www.bleepingcomputer.com/news/security/atandt-and-verizon-say-networks-secure-after-salt-typhoon-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/atandt-and-verizon-say-networks-secure-after-salt-typhoon-breach/</a></p><p><a href="https://www.bankinfosecurity.com/white-house-clears-hipaa-security-rule-update-a-27170" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/white-house-clears-hipaa-security-rule-update-a-27170</a></p><p><a href="https://www.securityweek.com/us-issues-final-rule-for-protecting-personal-data-against-foreign-adversaries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-issues-final-rule-for-protecting-personal-data-against-foreign-adversaries/</a></p><p><a href="https://www.justice.gov/nsd/media/1382521/dl" rel="noopener noreferrer" target="_blank">https://www.justice.gov/nsd/media/1382521/dl</a></p><p><a href="https://therecord.media/cyberhaven-hack-google-chrome-extension" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberhaven-hack-google-chrome-extension</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-firewall-zero-day-exploited-for-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-firewall-zero-day-exploited-for-dos-attacks/</a></p><p><a href="https://www.securityweek.com/four-faith-industrial-router-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/four-faith-industrial-router-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/flagstar-sec-fine-cyberattack/736070/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/flagstar-sec-fine-cyberattack/736070/</a></p><p><a href="https://therecord.media/finland-suspected-russian-spy-ship-undersea-cables-severed" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-suspected-russian-spy-ship-undersea-cables-severed</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Ninth Salt Typhoon Victim Identified, HIPPA Security Rule Update, Cyberhaven Hack, Zagg Breach</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Ninth Salt Typhoon victim identified with more news below:</p><p>• DOJ Protect Data Rule &nbsp;</p><p>• Cyberhaven Hack &nbsp;</p><p>• Palo Alto Networks patches firewall zeroday</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/nine-us-companies-hacked-salt-typhoon-china-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/nine-us-companies-hacked-salt-typhoon-china-espionage</a></p><p><a href="https://www.bleepingcomputer.com/news/security/atandt-and-verizon-say-networks-secure-after-salt-typhoon-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/atandt-and-verizon-say-networks-secure-after-salt-typhoon-breach/</a></p><p><a href="https://www.bankinfosecurity.com/white-house-clears-hipaa-security-rule-update-a-27170" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/white-house-clears-hipaa-security-rule-update-a-27170</a></p><p><a href="https://www.securityweek.com/us-issues-final-rule-for-protecting-personal-data-against-foreign-adversaries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-issues-final-rule-for-protecting-personal-data-against-foreign-adversaries/</a></p><p><a href="https://www.justice.gov/nsd/media/1382521/dl" rel="noopener noreferrer" target="_blank">https://www.justice.gov/nsd/media/1382521/dl</a></p><p><a href="https://therecord.media/cyberhaven-hack-google-chrome-extension" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberhaven-hack-google-chrome-extension</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-firewall-zero-day-exploited-for-dos-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-patches-firewall-zero-day-exploited-for-dos-attacks/</a></p><p><a href="https://www.securityweek.com/four-faith-industrial-router-vulnerability-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/four-faith-industrial-router-vulnerability-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/</a></p><p><a href="https://www.cybersecuritydive.com/news/flagstar-sec-fine-cyberattack/736070/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/flagstar-sec-fine-cyberattack/736070/</a></p><p><a href="https://therecord.media/finland-suspected-russian-spy-ship-undersea-cables-severed" rel="noopener noreferrer" target="_blank">https://therecord.media/finland-suspected-russian-spy-ship-undersea-cables-severed</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fa4abbda-0503-4353-9996-54691b762eb3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 30 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/96bc0f1e-133c-4251-a2d2-67b7a8ddf185/Ninth-Salt-Typhoon-Victim-Identified-HIPPA-Security-Rule-Update.mp3" length="25539786" type="audio/mpeg"/><itunes:duration>17:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>835</itunes:episode><podcast:episode>835</podcast:episode></item><item><title>Japan Airlines Hit by Cyberattack, Cl0p to Name Cleo Victims, General Dynamics Employee Phishing Attack</title><itunes:title>Japan Airlines Hit by Cyberattack, Cl0p to Name Cleo Victims, General Dynamics Employee Phishing Attack</itunes:title><description><![CDATA[<p>🚨 Japan Airlines Hit by Cyberattack, Cl0p to Name Cleo Victims, General Dynamics Employee Phishing Attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Japan Airlines hit by cyberattack with more news below:</p><p>• Cl0p to start naming Cleo victims &nbsp;</p><p>• Sql Injection vulnerability</p><p>• General Dynamics phishing attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/japan-airlines-was-hit-by-a-cyberattack-delaying-flights-during-the-year-end-holiday-season/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-airlines-was-hit-by-a-cyberattack-delaying-flights-during-the-year-end-holiday-season/</a></p><p><a href="https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack</a></p><p><a href="https://www.securityweek.com/cl0p-ransomware-group-to-name-over-60-victims-of-cleo-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cl0p-ransomware-group-to-name-over-60-victims-of-cleo-attack/</a></p><p><a href="https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html</a></p><p><a href="https://www.securityweek.com/defense-giant-general-dynamics-says-employees-targeted-in-phishing-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/defense-giant-general-dynamics-says-employees-targeted-in-phishing-attack/</a></p><p><a href="https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Japan Airlines Hit by Cyberattack, Cl0p to Name Cleo Victims, General Dynamics Employee Phishing Attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Japan Airlines hit by cyberattack with more news below:</p><p>• Cl0p to start naming Cleo victims &nbsp;</p><p>• Sql Injection vulnerability</p><p>• General Dynamics phishing attack</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/japan-airlines-was-hit-by-a-cyberattack-delaying-flights-during-the-year-end-holiday-season/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/japan-airlines-was-hit-by-a-cyberattack-delaying-flights-during-the-year-end-holiday-season/</a></p><p><a href="https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack</a></p><p><a href="https://www.securityweek.com/cl0p-ransomware-group-to-name-over-60-victims-of-cleo-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cl0p-ransomware-group-to-name-over-60-victims-of-cleo-attack/</a></p><p><a href="https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html</a></p><p><a href="https://www.securityweek.com/defense-giant-general-dynamics-says-employees-targeted-in-phishing-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/defense-giant-general-dynamics-says-employees-targeted-in-phishing-attack/</a></p><p><a href="https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">66c9462c-e47d-4fda-9967-f015ab84089d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 26 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/abd5c09d-3b75-4feb-8de1-29e8958a5991/Japan-Airlines-Hit-by-Cyberattack-Cl0p-to-Name-Cleo-Victims-Gen.mp3" length="15488077" type="audio/mpeg"/><itunes:duration>10:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>834</itunes:episode><podcast:episode>834</podcast:episode></item><item><title>Mike Walz Wants to go on the offense with China, Rip &amp; Replace Approved with NDAA, Clop Cleo Attack</title><itunes:title>Mike Walz Wants to go on the offense with China, Rip &amp; Replace Approved with NDAA, Clop Cleo Attack</itunes:title><description><![CDATA[<p>🚨 Mike Walz Wants to go on the offense with China, Rip &amp; Replace Approved with NDAA, Clop Cleo Attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Mike Walz Talks about a new cybersecurity doctrine and the Chinese threat with more news below:</p><p>• FCC gets $3B for Rip &amp; Replace &nbsp;</p><p>• FTC Orders Marriott &amp; Starwood to Implement Data Security</p><p>• Clop Threatens 66 Cleo Victims</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.dailywire.com/episode/mike-waltz-member-exclusive" rel="noopener noreferrer" target="_blank">https://www.dailywire.com/episode/mike-waltz-member-exclusive</a></p><p><a href="https://therecord.media/fcc-rip-and-replace-china-tech-tops-ndaa" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-rip-and-replace-china-tech-tops-ndaa</a></p><p><a href="https://www.securityweek.com/adobe-patches-coldfusion-flaw-at-high-risk-of-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-coldfusion-flaw-at-high-risk-of-exploitation/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-orders-marriott-and-starwood-to-implement-strict-data-security/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-orders-marriott-and-starwood-to-implement-strict-data-security/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-threatens-66-cleo-attack-victims-with-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clop-ransomware-threatens-66-cleo-attack-victims-with-data-leak/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Mike Walz Wants to go on the offense with China, Rip &amp; Replace Approved with NDAA, Clop Cleo Attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Mike Walz Talks about a new cybersecurity doctrine and the Chinese threat with more news below:</p><p>• FCC gets $3B for Rip &amp; Replace &nbsp;</p><p>• FTC Orders Marriott &amp; Starwood to Implement Data Security</p><p>• Clop Threatens 66 Cleo Victims</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.dailywire.com/episode/mike-waltz-member-exclusive" rel="noopener noreferrer" target="_blank">https://www.dailywire.com/episode/mike-waltz-member-exclusive</a></p><p><a href="https://therecord.media/fcc-rip-and-replace-china-tech-tops-ndaa" rel="noopener noreferrer" target="_blank">https://therecord.media/fcc-rip-and-replace-china-tech-tops-ndaa</a></p><p><a href="https://www.securityweek.com/adobe-patches-coldfusion-flaw-at-high-risk-of-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-coldfusion-flaw-at-high-risk-of-exploitation/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-orders-marriott-and-starwood-to-implement-strict-data-security/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ftc-orders-marriott-and-starwood-to-implement-strict-data-security/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-threatens-66-cleo-attack-victims-with-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clop-ransomware-threatens-66-cleo-attack-victims-with-data-leak/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3d906c8c-e98b-4b81-8cfa-4bb1e3990912</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 24 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cac14e8a-58de-4727-a247-74b2cd8dcafb/Mike-Walz-Wants-to-go-on-the-offense-with-China-Rip-Replace-App.mp3" length="22602578" type="audio/mpeg"/><itunes:duration>15:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>833</itunes:episode><podcast:episode>833</podcast:episode></item><item><title>NSO Group Found Liable in Whatsapp Case, Sophos Firewall Flaw, Chinese Blame US for Cyber Attack, ICS News</title><itunes:title>NSO Group Found Liable in Whatsapp Case, Sophos Firewall Flaw, Chinese Blame US for Cyber Attack, ICS News</itunes:title><description><![CDATA[<p>🚨 NSO Group Found Liable in Whatsapp Case, Sophos Firewall Flaw, Chinese Blame US for Cyber Attack, ICS News</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as NSO Group Found Liable in CA WhatsApp Case with more news below:</p><p>• CISA Requires patch now to BeyondTrust Flaw &nbsp;</p><p>• Play Ransomware Claims Krispy Kreme</p><p>• US Charges LockBit Criminal</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users" rel="noopener noreferrer" target="_blank">https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users</a></p><p><a href="https://www.securityweek.com/cisa-urges-immediate-patching-of-exploited-beyondtrust-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-urges-immediate-patching-of-exploited-beyondtrust-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sophos-discloses-critical-firewall-remote-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sophos-discloses-critical-firewall-remote-code-execution-flaw/</a></p><p><a href="https://www.securityweek.com/rockwell-powermonitor-vulnerabilities-allow-remote-hacking-of-industrial-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-powermonitor-vulnerabilities-allow-remote-hacking-of-industrial-systems/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-theft-of-personal-financial-data-from-krispy-kreme/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-theft-of-personal-financial-data-from-krispy-kreme/</a></p><p><a href="https://www.bankinfosecurity.com/atos-completes-financial-restructuring-a-27119" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/atos-completes-financial-restructuring-a-27119</a></p><p><a href="https://cyberscoop.com/chinese-cyber-center-us-alleged-cyberattacks-trade-secrets/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/chinese-cyber-center-us-alleged-cyberattacks-trade-secrets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/</a></p><p><a href="https://www.bankinfosecurity.com/siemens-warns-critical-vulnerability-in-umc-a-27121" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/siemens-warns-critical-vulnerability-in-umc-a-27121</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 NSO Group Found Liable in Whatsapp Case, Sophos Firewall Flaw, Chinese Blame US for Cyber Attack, ICS News</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as NSO Group Found Liable in CA WhatsApp Case with more news below:</p><p>• CISA Requires patch now to BeyondTrust Flaw &nbsp;</p><p>• Play Ransomware Claims Krispy Kreme</p><p>• US Charges LockBit Criminal</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users" rel="noopener noreferrer" target="_blank">https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users</a></p><p><a href="https://www.securityweek.com/cisa-urges-immediate-patching-of-exploited-beyondtrust-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-urges-immediate-patching-of-exploited-beyondtrust-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sophos-discloses-critical-firewall-remote-code-execution-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/sophos-discloses-critical-firewall-remote-code-execution-flaw/</a></p><p><a href="https://www.securityweek.com/rockwell-powermonitor-vulnerabilities-allow-remote-hacking-of-industrial-systems/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/rockwell-powermonitor-vulnerabilities-allow-remote-hacking-of-industrial-systems/</a></p><p><a href="https://www.securityweek.com/ransomware-group-claims-theft-of-personal-financial-data-from-krispy-kreme/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-group-claims-theft-of-personal-financial-data-from-krispy-kreme/</a></p><p><a href="https://www.bankinfosecurity.com/atos-completes-financial-restructuring-a-27119" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/atos-completes-financial-restructuring-a-27119</a></p><p><a href="https://cyberscoop.com/chinese-cyber-center-us-alleged-cyberattacks-trade-secrets/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/chinese-cyber-center-us-alleged-cyberattacks-trade-secrets/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-flowerstorm-microsoft-phishing-service-fills-void-left-by-rockstar2fa/</a></p><p><a href="https://www.bankinfosecurity.com/siemens-warns-critical-vulnerability-in-umc-a-27121" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/siemens-warns-critical-vulnerability-in-umc-a-27121</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c4325af5-141f-46fe-b86f-59ec0e361a30</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 23 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/774c5829-8cda-4e5f-ba25-55bdc597d02a/NSO-Group-Found-Liable-in-Whatsapp-Case-Sophos-Firewall-Flaw-Ch.mp3" length="32648018" type="audio/mpeg"/><itunes:duration>22:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>832</itunes:episode><podcast:episode>832</podcast:episode></item><item><title>CISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts</title><itunes:title>CISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts</itunes:title><description><![CDATA[<p>🚨 CISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as CISA Encourages Encrypted Apps for Messaging with more news below:</p><p>• CISA Mandates Cloud Security &nbsp;</p><p>• Google Calendar Phishing Abuse &nbsp;</p><p>• SonicWall critical flaw &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-considers-banning-tp-link-routers-over-cybersecurity-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-considers-banning-tp-link-routers-over-cybersecurity-risks/</a></p><p><a href="https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html</a></p><p><a href="https://www.bankinfosecurity.com/critical-flaws-expose-25000-sonicwall-devices-to-hackers-a-27101" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/critical-flaws-expose-25000-sonicwall-devices-to-hackers-a-27101</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/</a></p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/</a></p><p><a href="https://www.securityweek.com/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/</a></p><p><a href="https://www.securityweek.com/chrome-131-update-patches-high-severity-memory-safety-bugs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-131-update-patches-high-severity-memory-safety-bugs/</a></p><p><a href="https://www.darkreading.com/cyber-risk/india-surge-api-attacks-banking-utilities" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/india-surge-api-attacks-banking-utilities</a></p><p><a href="https://therecord.media/dutch-fines-millions-regulator-netflix" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-fines-millions-regulator-netflix</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 CISA Encourages Encrypted Apps for Messaging, TP-Link Router Ban, Hubspot Phishing Targets Azure Accounts</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as CISA Encourages Encrypted Apps for Messaging with more news below:</p><p>• CISA Mandates Cloud Security &nbsp;</p><p>• Google Calendar Phishing Abuse &nbsp;</p><p>• SonicWall critical flaw &nbsp;&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-considers-banning-tp-link-routers-over-cybersecurity-risks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-considers-banning-tp-link-routers-over-cybersecurity-risks/</a></p><p><a href="https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html</a></p><p><a href="https://www.bankinfosecurity.com/critical-flaws-expose-25000-sonicwall-devices-to-hackers-a-27101" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/critical-flaws-expose-25000-sonicwall-devices-to-hackers-a-27101</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/</a></p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/</a></p><p><a href="https://www.securityweek.com/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/</a></p><p><a href="https://www.securityweek.com/chrome-131-update-patches-high-severity-memory-safety-bugs/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chrome-131-update-patches-high-severity-memory-safety-bugs/</a></p><p><a href="https://www.darkreading.com/cyber-risk/india-surge-api-attacks-banking-utilities" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyber-risk/india-surge-api-attacks-banking-utilities</a></p><p><a href="https://therecord.media/dutch-fines-millions-regulator-netflix" rel="noopener noreferrer" target="_blank">https://therecord.media/dutch-fines-millions-regulator-netflix</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Website: <a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">cba2cbdb-7507-43dc-a20e-6e39a494651c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 19 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ee406751-6f35-445b-8221-8862438d2e09/CISA-Encourages-Encrypted-Apps-for-Messaging-TP-Link-Router-Ban.mp3" length="28567900" type="audio/mpeg"/><itunes:duration>19:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>831</itunes:episode><podcast:episode>831</podcast:episode></item><item><title>Cisco Data Leaked Online, Meta Fined $263M for GDPR Violation, Apache Struts Flaw Exploited</title><itunes:title>Cisco Data Leaked Online, Meta Fined $263M for GDPR Violation, Apache Struts Flaw Exploited</itunes:title><description><![CDATA[<p>🚨 Cisco Data Leaked Online, Meta Fined $263M for GDPR Violation, Apache Struts Flaw Exploited</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as ConnectonCall data breach exposes 910,000 victims with more news below:</p><p>• APT29 Targets high value victims</p><p>• Pre-Ransomware Alerts Double</p><p>• Nebraska AG Sues Change Healthcare &nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/</a></p><p><a href="https://www.securityweek.com/hacker-leaks-cisco-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-leaks-cisco-data/</a></p><p><a href="https://therecord.media/meta-fined-263-million-gdpr-violations-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/meta-fined-263-million-gdpr-violations-data-breach</a></p><p><a href="https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/</a></p><p><a href="https://www.securityweek.com/beyondtrust-patches-critical-vulnerability-discovered-during-security-incident-probe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beyondtrust-patches-critical-vulnerability-discovered-during-security-incident-probe/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-pre-ransomware-alerts-double/735785/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-pre-ransomware-alerts-double/735785/</a></p><p><a href="https://therecord.media/nebraska-ag-sues-change-healthcare-unitedhealth-after-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/nebraska-ag-sues-change-healthcare-unitedhealth-after-ransomware-attack</a></p><p><a href="https://www.bankinfosecurity.com/us-congressional-task-force-offers-roadmap-for-ai-governance-a-27084" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-congressional-task-force-offers-roadmap-for-ai-governance-a-27084</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Cisco Data Leaked Online, Meta Fined $263M for GDPR Violation, Apache Struts Flaw Exploited</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as ConnectonCall data breach exposes 910,000 victims with more news below:</p><p>• APT29 Targets high value victims</p><p>• Pre-Ransomware Alerts Double</p><p>• Nebraska AG Sues Change Healthcare &nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/connectoncall-breach-exposes-health-data-of-over-910-000-patients/</a></p><p><a href="https://www.securityweek.com/hacker-leaks-cisco-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hacker-leaks-cisco-data/</a></p><p><a href="https://therecord.media/meta-fined-263-million-gdpr-violations-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/meta-fined-263-million-gdpr-violations-data-breach</a></p><p><a href="https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/</a></p><p><a href="https://www.securityweek.com/beyondtrust-patches-critical-vulnerability-discovered-during-security-incident-probe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/beyondtrust-patches-critical-vulnerability-discovered-during-security-incident-probe/</a></p><p><a href="https://www.cybersecuritydive.com/news/cisa-pre-ransomware-alerts-double/735785/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cisa-pre-ransomware-alerts-double/735785/</a></p><p><a href="https://therecord.media/nebraska-ag-sues-change-healthcare-unitedhealth-after-ransomware-attack" rel="noopener noreferrer" target="_blank">https://therecord.media/nebraska-ag-sues-change-healthcare-unitedhealth-after-ransomware-attack</a></p><p><a href="https://www.bankinfosecurity.com/us-congressional-task-force-offers-roadmap-for-ai-governance-a-27084" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-congressional-task-force-offers-roadmap-for-ai-governance-a-27084</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6d26c8b2-235b-44c4-99f4-3c239fabfe6e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 18 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e97d0e88-47f6-40d7-a8cd-1974f3ff350b/Cisco-Data-Leaked-Online-Meta-Fined-263M-for-GDPR-Violation-Apa.mp3" length="29009265" type="audio/mpeg"/><itunes:duration>20:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>830</itunes:episode><podcast:episode>830</podcast:episode></item><item><title>Clop Behind Cleo Data Theft, Rhode Island Data Breach, Windows Kernal Zeroday, HMI Risk to Water Systems</title><itunes:title>Clop Behind Cleo Data Theft, Rhode Island Data Breach, Windows Kernal Zeroday, HMI Risk to Water Systems</itunes:title><description><![CDATA[<p>🚨 Clop Behind Cleo Data Theft, Rhode Island Data Breach, Windows Kernal Zeroday, HMI Risk to Water Systems</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Clop Ransomware claims responsibility for the Cleo Data theft with more news below:</p><p>• Texas Tech Data breach</p><p>• FBI Spots Hiatusrat malware</p><p>• Android Novispy Spyware &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-exploited-adobe-coldfusion-windows-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-exploited-adobe-coldfusion-windows-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/</a></p><p><a href="https://thecyberexpress.com/exposed-human-machine-interfaces-in-wws/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/exposed-human-machine-interfaces-in-wws/</a></p><p><a href="https://www.cisa.gov/news-events/alerts/2024/12/13/cisa-and-epa-release-joint-fact-sheet-detailing-risks-internet-exposed-hmis-pose-wws-sector" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/alerts/2024/12/13/cisa-and-epa-release-joint-fact-sheet-detailing-risks-internet-exposed-hmis-pose-wws-sector</a></p><p><a href="https://therecord.media/cisa-first-draft-updated-cyber-plan" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-first-draft-updated-cyber-plan</a></p><p><a href="https://www.securityweek.com/blackberry-sells-cylance-to-arctic-wolf-for-160-million-after-buying-it-for-1-4-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/blackberry-sells-cylance-to-arctic-wolf-for-160-million-after-buying-it-for-1-4-billion/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Clop Behind Cleo Data Theft, Rhode Island Data Breach, Windows Kernal Zeroday, HMI Risk to Water Systems</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Clop Ransomware claims responsibility for the Cleo Data theft with more news below:</p><p>• Texas Tech Data breach</p><p>• FBI Spots Hiatusrat malware</p><p>• Android Novispy Spyware &nbsp;&nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-spots-hiatusrat-malware-attacks-targeting-web-cameras-dvrs/</a></p><p><a href="https://www.securityweek.com/cisa-warns-of-exploited-adobe-coldfusion-windows-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-of-exploited-adobe-coldfusion-windows-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/</a></p><p><a href="https://thecyberexpress.com/exposed-human-machine-interfaces-in-wws/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/exposed-human-machine-interfaces-in-wws/</a></p><p><a href="https://www.cisa.gov/news-events/alerts/2024/12/13/cisa-and-epa-release-joint-fact-sheet-detailing-risks-internet-exposed-hmis-pose-wws-sector" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/alerts/2024/12/13/cisa-and-epa-release-joint-fact-sheet-detailing-risks-internet-exposed-hmis-pose-wws-sector</a></p><p><a href="https://therecord.media/cisa-first-draft-updated-cyber-plan" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-first-draft-updated-cyber-plan</a></p><p><a href="https://www.securityweek.com/blackberry-sells-cylance-to-arctic-wolf-for-160-million-after-buying-it-for-1-4-billion/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/blackberry-sells-cylance-to-arctic-wolf-for-160-million-after-buying-it-for-1-4-billion/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d6d1a443-3083-4e71-a393-5ccdfa942d8b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 17 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7f5d2b56-7d1c-45d2-8add-dc15fb37bd83/Clop-Behind-Cleo-Data-Theft-Rhode-Island-Data-Breach-Windows-Ke.mp3" length="22169363" type="audio/mpeg"/><itunes:duration>15:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>829</itunes:episode><podcast:episode>829</podcast:episode></item><item><title>US Updates Science &amp; Tech Pact with China, Iran Targets US &amp; Israel with Malware, IT Workers indicted</title><itunes:title>US Updates Science &amp; Tech Pact with China, Iran Targets US &amp; Israel with Malware, IT Workers indicted</itunes:title><description><![CDATA[<p>🚨 US Updates Science &amp; Tech Pact with China, Iran Targets US &amp; Israel with Malware, IT Workers indicted</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Updates Science &amp; Tech Pact with China, with more news below:</p><p>• South Carolina Credit Union Cyber attack</p><p>• Cleo Bug used in Ransomware</p><p>• Citrix Shares NetScaler Mitigation &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-confirms-critical-cleo-bug-exploitation-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-confirms-critical-cleo-bug-exploitation-in-ransomware-attacks/</a></p><p><a href="https://therecord.media/south-carolina-credit-union-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/south-carolina-credit-union-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/auto-parts-giant-lkq-says-cyberattack-disrupted-canadian-business-unit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/auto-parts-giant-lkq-says-cyberattack-disrupted-canadian-business-unit/</a></p><p><a href="https://www.securityweek.com/hackers-possibly-stole-personal-data-from-bitcoin-atm-operator-byte-federal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-possibly-stole-personal-data-from-bitcoin-atm-operator-byte-federal/</a></p><p><a href="https://www.securityweek.com/iranian-hackers-use-iocontrol-malware-to-target-ot-iot-devices-in-us-israel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-use-iocontrol-malware-to-target-ot-iot-devices-in-us-israel/</a></p><p><a href="https://www.securityweek.com/us-updates-a-science-and-technology-pact-with-china-to-reflect-growing-rivalry-and-security-threats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-updates-a-science-and-technology-pact-with-china-to-reflect-growing-rivalry-and-security-threats/</a></p><p><a href="https://www.securityweek.com/fake-it-workers-funneled-millions-to-north-korea-doj-says/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fake-it-workers-funneled-millions-to-north-korea-doj-says/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/</a></p><p><a href="https://therecord.media/three-arrested-in-kosovo-rydox-marketplace-awaiting-extradition" rel="noopener noreferrer" target="_blank">https://therecord.media/three-arrested-in-kosovo-rydox-marketplace-awaiting-extradition</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 US Updates Science &amp; Tech Pact with China, Iran Targets US &amp; Israel with Malware, IT Workers indicted</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Updates Science &amp; Tech Pact with China, with more news below:</p><p>• South Carolina Credit Union Cyber attack</p><p>• Cleo Bug used in Ransomware</p><p>• Citrix Shares NetScaler Mitigation &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-confirms-critical-cleo-bug-exploitation-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-confirms-critical-cleo-bug-exploitation-in-ransomware-attacks/</a></p><p><a href="https://therecord.media/south-carolina-credit-union-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/south-carolina-credit-union-data-breach</a></p><p><a href="https://www.bleepingcomputer.com/news/security/auto-parts-giant-lkq-says-cyberattack-disrupted-canadian-business-unit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/auto-parts-giant-lkq-says-cyberattack-disrupted-canadian-business-unit/</a></p><p><a href="https://www.securityweek.com/hackers-possibly-stole-personal-data-from-bitcoin-atm-operator-byte-federal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-possibly-stole-personal-data-from-bitcoin-atm-operator-byte-federal/</a></p><p><a href="https://www.securityweek.com/iranian-hackers-use-iocontrol-malware-to-target-ot-iot-devices-in-us-israel/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/iranian-hackers-use-iocontrol-malware-to-target-ot-iot-devices-in-us-israel/</a></p><p><a href="https://www.securityweek.com/us-updates-a-science-and-technology-pact-with-china-to-reflect-growing-rivalry-and-security-threats/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-updates-a-science-and-technology-pact-with-china-to-reflect-growing-rivalry-and-security-threats/</a></p><p><a href="https://www.securityweek.com/fake-it-workers-funneled-millions-to-north-korea-doj-says/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fake-it-workers-funneled-millions-to-north-korea-doj-says/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/</a></p><p><a href="https://therecord.media/three-arrested-in-kosovo-rydox-marketplace-awaiting-extradition" rel="noopener noreferrer" target="_blank">https://therecord.media/three-arrested-in-kosovo-rydox-marketplace-awaiting-extradition</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9e8a70f5-0e46-41a8-96b1-2198d8b6986e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 16 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc37b09d-a3e5-4cf0-971e-32d2e0f03cb7/US-Updates-Science-Tech-Pact-with-China-Iran-Targets-US-Israel-.mp3" length="22437693" type="audio/mpeg"/><itunes:duration>15:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>828</itunes:episode><podcast:episode>828</podcast:episode></item><item><title>🚨 Krispy Kreme Cyberattack, US Defense Bill Passes, $3B to Teleco’s to rip and replace, Apple Patch</title><itunes:title>🚨 Krispy Kreme Cyberattack, US Defense Bill Passes, $3B to Teleco’s to rip and replace, Apple Patch</itunes:title><description><![CDATA[<p>🚨 Krispy Kreme Cyberattack, US Defense Bill Passes, $3B to Teleco’s to rip and replace, Apple Patch</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Krispy Kreme cyber attack hinders doughnut lovers with more news below:</p><p>• US Defense Bill Focus on Cyber, Tech &amp; AI &nbsp;</p><p>• Chinese Android Spyware</p><p>• Cyber Command &amp; NSA Dual hat</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/no-doughnuts-today-cyberattack-puts-krispy-kreme-in-a-sticky-situation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/no-doughnuts-today-cyberattack-puts-krispy-kreme-in-a-sticky-situation/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lynx-ransomware-behind-electrica-energy-supplier-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lynx-ransomware-behind-electrica-energy-supplier-cyberattack/</a></p><p><a href="https://www.bankinfosecurity.com/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons</a></p><p><a href="https://cyberscoop.com/senators-witnesses-3b-for-rip-and-replace-a-good-start-to-preventing-salt-typhoon-style-breaches/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/senators-witnesses-3b-for-rip-and-replace-a-good-start-to-preventing-salt-typhoon-style-breaches/</a></p><p><a href="https://therecord.media/cyber-command-nsa-dual-hat-trump" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-dual-hat-trump</a></p><p><a href="https://www.securityweek.com/apple-pushes-major-ios-macos-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-pushes-major-ios-macos-security-updates/</a></p><p><a href="https://www.securityweek.com/atlassian-splunk-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/atlassian-splunk-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-eaglemsgspy-android-spyware-used-by-chinese-police-researchers-say/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-eaglemsgspy-android-spyware-used-by-chinese-police-researchers-say/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/operation-poweroff-shuts-down-27-ddos-for-hire-platforms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/operation-poweroff-shuts-down-27-ddos-for-hire-platforms/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Krispy Kreme Cyberattack, US Defense Bill Passes, $3B to Teleco’s to rip and replace, Apple Patch</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Krispy Kreme cyber attack hinders doughnut lovers with more news below:</p><p>• US Defense Bill Focus on Cyber, Tech &amp; AI &nbsp;</p><p>• Chinese Android Spyware</p><p>• Cyber Command &amp; NSA Dual hat</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/no-doughnuts-today-cyberattack-puts-krispy-kreme-in-a-sticky-situation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/no-doughnuts-today-cyberattack-puts-krispy-kreme-in-a-sticky-situation/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lynx-ransomware-behind-electrica-energy-supplier-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lynx-ransomware-behind-electrica-energy-supplier-cyberattack/</a></p><p><a href="https://www.bankinfosecurity.com/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons</a></p><p><a href="https://cyberscoop.com/senators-witnesses-3b-for-rip-and-replace-a-good-start-to-preventing-salt-typhoon-style-breaches/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/senators-witnesses-3b-for-rip-and-replace-a-good-start-to-preventing-salt-typhoon-style-breaches/</a></p><p><a href="https://therecord.media/cyber-command-nsa-dual-hat-trump" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-nsa-dual-hat-trump</a></p><p><a href="https://www.securityweek.com/apple-pushes-major-ios-macos-security-updates/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-pushes-major-ios-macos-security-updates/</a></p><p><a href="https://www.securityweek.com/atlassian-splunk-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/atlassian-splunk-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-eaglemsgspy-android-spyware-used-by-chinese-police-researchers-say/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-eaglemsgspy-android-spyware-used-by-chinese-police-researchers-say/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/operation-poweroff-shuts-down-27-ddos-for-hire-platforms/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/operation-poweroff-shuts-down-27-ddos-for-hire-platforms/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6830f159-62b2-4036-a57e-36e72f47e596</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 12 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/aa079dee-80ba-4ac8-ba30-31cf204defa6/Krispy-Kreme-Cyberattack-US-Defense-Bill-Passes-3B-to-Teleco-s-.mp3" length="30626140" type="audio/mpeg"/><itunes:duration>21:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>827</itunes:episode><podcast:episode>827</podcast:episode></item><item><title>Chinese Charges for Sophos Firewall Hack, Cleo Zeroday Exploited, Cyber Credit Risk, Patch Tuesday</title><itunes:title>Chinese Charges for Sophos Firewall Hack, Cleo Zeroday Exploited, Cyber Credit Risk, Patch Tuesday</itunes:title><description><![CDATA[<p>🚨 Chinese Charges for Sophos Firewall Hack, Cleo Zeroday Exploited, Cyber Credit Risk, Patch Tuesday</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Charges Chinese man for Sophos firewall hack with more news below:</p><p>• AMD Security Flaw</p><p>• Patch Tuesday Recap</p><p>• FCC Drops the Ball &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/us-charges-sanctions-chinese-man-accused-of-sophos-firewall-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-charges-sanctions-chinese-man-accused-of-sophos-firewall-hacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/</a></p><p><a href="https://www.cybersecuritydive.com/news/credit-risk-cyber-moodys/735066/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/credit-risk-cyber-moodys/735066/</a></p><p><a href="https://therecord.media/amd-security-flaw-badram" rel="noopener noreferrer" target="_blank">https://therecord.media/amd-security-flaw-badram</a></p><p><a href="https://www.darkreading.com/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials</a></p><p><a href="https://therecord.media/senator-wyden-stricter-telecom-cyber-standards-salt-typhoon-china" rel="noopener noreferrer" target="_blank">https://therecord.media/senator-wyden-stricter-telecom-cyber-standards-salt-typhoon-china</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-vulnerability-in-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-vulnerability-in-netweaver/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-critical-flaws-in-connect-secure-cloud-services-application/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-critical-flaws-in-connect-secure-cloud-services-application/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-siemens-schneider-cisa-others/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-siemens-schneider-cisa-others/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Chinese Charges for Sophos Firewall Hack, Cleo Zeroday Exploited, Cyber Credit Risk, Patch Tuesday</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US Charges Chinese man for Sophos firewall hack with more news below:</p><p>• AMD Security Flaw</p><p>• Patch Tuesday Recap</p><p>• FCC Drops the Ball &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/us-charges-sanctions-chinese-man-accused-of-sophos-firewall-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-charges-sanctions-chinese-man-accused-of-sophos-firewall-hacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/</a></p><p><a href="https://www.cybersecuritydive.com/news/credit-risk-cyber-moodys/735066/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/credit-risk-cyber-moodys/735066/</a></p><p><a href="https://therecord.media/amd-security-flaw-badram" rel="noopener noreferrer" target="_blank">https://therecord.media/amd-security-flaw-badram</a></p><p><a href="https://www.darkreading.com/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials</a></p><p><a href="https://therecord.media/senator-wyden-stricter-telecom-cyber-standards-salt-typhoon-china" rel="noopener noreferrer" target="_blank">https://therecord.media/senator-wyden-stricter-telecom-cyber-standards-salt-typhoon-china</a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/</a></p><p><a href="https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/</a></p><p><a href="https://www.securityweek.com/sap-patches-critical-vulnerability-in-netweaver/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sap-patches-critical-vulnerability-in-netweaver/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-critical-flaws-in-connect-secure-cloud-services-application/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-critical-flaws-in-connect-secure-cloud-services-application/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-siemens-schneider-cisa-others/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-siemens-schneider-cisa-others/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">d9cecf59-7db1-4af7-8cc1-5ec4e623ee2a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 11 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/31b0d6ef-cd2c-41f0-b73c-752d6800af60/Chinese-Charges-for-Sophos-Firewall-Hack-Cleo-Zeroday-Exploited.mp3" length="26048233" type="audio/mpeg"/><itunes:duration>18:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>826</itunes:episode><podcast:episode>826</podcast:episode></item><item><title>🚨 Cyber Attack on Artivion – Heart Surgery Device Maker, Russian Attack on Ukraine Defense, Radiant Capital Heist</title><itunes:title>🚨 Cyber Attack on Artivion – Heart Surgery Device Maker, Russian Attack on Ukraine Defense, Radiant Capital Heist</itunes:title><description><![CDATA[<p>🚨 Cyber Attack on Artivion – Heart Surgery Device Maker, Russian Attack on Ukraine Defense, Radiant Capital Heist</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Artivion cyber-attack with more news below:</p><p>• Electric Distributor cyberattack</p><p>• Chinese Hackers use Visual code for remote access</p><p>• Microsoft NTLM Zero day</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/radiant-capital-50-million-heist-blamed-on-north-korean-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/radiant-capital-50-million-heist-blamed-on-north-korean-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/</a></p><p><a href="https://therecord.media/electric-distributor-cyberattack-romania" rel="noopener noreferrer" target="_blank">https://therecord.media/electric-distributor-cyberattack-romania</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/</a></p><p><a href="https://therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage</a></p><p><a href="https://www.darkreading.com/application-security/microsoft-ntlm-zero-day-remain-unpatched-april" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/microsoft-ntlm-zero-day-remain-unpatched-april</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-brendan-carr-concern-salt-typhoon/734995/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-brendan-carr-concern-salt-typhoon/734995/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Cyber Attack on Artivion – Heart Surgery Device Maker, Russian Attack on Ukraine Defense, Radiant Capital Heist</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Artivion cyber-attack with more news below:</p><p>• Electric Distributor cyberattack</p><p>• Chinese Hackers use Visual code for remote access</p><p>• Microsoft NTLM Zero day</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/radiant-capital-50-million-heist-blamed-on-north-korean-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/radiant-capital-50-million-heist-blamed-on-north-korean-hackers/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/</a></p><p><a href="https://therecord.media/electric-distributor-cyberattack-romania" rel="noopener noreferrer" target="_blank">https://therecord.media/electric-distributor-cyberattack-romania</a></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/</a></p><p><a href="https://therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage" rel="noopener noreferrer" target="_blank">https://therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage</a></p><p><a href="https://www.darkreading.com/application-security/microsoft-ntlm-zero-day-remain-unpatched-april" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/microsoft-ntlm-zero-day-remain-unpatched-april</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-brendan-carr-concern-salt-typhoon/734995/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-brendan-carr-concern-salt-typhoon/734995/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">408acc29-c71c-4f75-8e9d-96c867a4b12d</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 10 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/623f73db-e7e2-4311-bb52-7883acaf13ac/Cyber-Attack-on-Artivion-Heart-Surgery-Device-Maker-Russian-Att.mp3" length="16225984" type="audio/mpeg"/><itunes:duration>11:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>825</itunes:episode><podcast:episode>825</podcast:episode></item><item><title>🚨 Romania Election Reversed due to Russia Interference, Salt Typhoon Fall out Begins, Deloitte Breach</title><itunes:title>🚨 Romania Election Reversed due to Russia Interference, Salt Typhoon Fall out Begins, Deloitte Breach</itunes:title><description><![CDATA[<p>🚨 Romania Election Reversed due to Russia Interference, Salt Typhoon Fall out Begins, Deloitte Breach</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Romania reverses elections due to Russian interference with more news below:</p><p>• FCC Calls on more Telecom Breach</p><p>• Chinese Cyber Activities</p><p>• Deloitte data breach</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/</a></p><p><a href="https://www.securityweek.com/deloitte-responds-after-ransomware-groups-claims-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/deloitte-responds-after-ransomware-groups-claims-data-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/</a></p><p><a href="https://therecord.media/cooperate-salt-typhoon-telecoms-probe" rel="noopener noreferrer" target="_blank">https://therecord.media/cooperate-salt-typhoon-telecoms-probe</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/</a></p><p><a href="https://www.bankinfosecurity.com/spyware-campaign-targets-sino-minority-groups-via-wechat-a-26998" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/spyware-campaign-targets-sino-minority-groups-via-wechat-a-26998</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks</a></p><p><a href="https://www.securityweek.com/eight-suspected-phishers-arrested-in-belgium-netherlands/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/eight-suspected-phishers-arrested-in-belgium-netherlands/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?mod=cybersecurity_news_article_pos1</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Romania Election Reversed due to Russia Interference, Salt Typhoon Fall out Begins, Deloitte Breach</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as Romania reverses elections due to Russian interference with more news below:</p><p>• FCC Calls on more Telecom Breach</p><p>• Chinese Cyber Activities</p><p>• Deloitte data breach</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/</a></p><p><a href="https://www.securityweek.com/deloitte-responds-after-ransomware-groups-claims-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/deloitte-responds-after-ransomware-groups-claims-data-theft/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/</a></p><p><a href="https://therecord.media/cooperate-salt-typhoon-telecoms-probe" rel="noopener noreferrer" target="_blank">https://therecord.media/cooperate-salt-typhoon-telecoms-probe</a></p><p><a href="https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/</a></p><p><a href="https://www.bankinfosecurity.com/spyware-campaign-targets-sino-minority-groups-via-wechat-a-26998" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/spyware-campaign-targets-sino-minority-groups-via-wechat-a-26998</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks</a></p><p><a href="https://www.securityweek.com/eight-suspected-phishers-arrested-in-belgium-netherlands/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/eight-suspected-phishers-arrested-in-belgium-netherlands/</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/hacking-brian-krebs-snowflake-waifu-49b87fce?mod=cybersecurity_news_article_pos1</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ce02a108-ecd6-42c1-a499-f3bdb285d3a5</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 09 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/57abb904-3b0b-4112-a6a9-6dc52cdfb149/Romania-Election-Reversed-due-to-Russia-Interference-Salt-Typho.mp3" length="26257004" type="audio/mpeg"/><itunes:duration>18:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>824</itunes:episode><podcast:episode>824</podcast:episode></item><item><title>🚨 White House Details Chinese Telecom Hacking Campaign, Pegasus Spyware Activity, Spy vs Spy, Russian Laundering Scheme</title><itunes:title>🚨 White House Details Chinese Telecom Hacking Campaign, Pegasus Spyware Activity, Spy vs Spy, Russian Laundering Scheme</itunes:title><description><![CDATA[<p>🚨 White House Details Chinese Telecom Hacking Campaign, Pegasus Spyware Activity, Spy vs Spy, Russian Laundering Scheme </p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as White House details Salt Typhoon Telecom Hack with more news below:</p><p>• Senators call on DoD probe</p><p>• BT Investigating Breach</p><p>• Russian Money Laundering Disrupted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/</a></p><p><a href="https://therecord.media/salt-typhoon-csrb-review" rel="noopener noreferrer" target="_blank">https://therecord.media/salt-typhoon-csrb-review</a></p><p><a href="https://therecord.media/senators-urge-dod-probe-salt-typhoon" rel="noopener noreferrer" target="_blank">https://therecord.media/senators-urge-dod-probe-salt-typhoon</a></p><p><a href="https://www.cybersecuritydive.com/news/ascension-reduces-operating-cyber-attack/734580/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ascension-reduces-operating-cyber-attack/734580/</a></p><p><a href="https://www.securityweek.com/bt-investigating-hack-after-ransomware-group-claims-theft-of-sensitive-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bt-investigating-hack-after-ransomware-group-claims-theft-of-sensitive-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-disrupts-russian-money-laundering-networks-used-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-disrupts-russian-money-laundering-networks-used-by-ransomware/</a></p><p><a href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/</a></p><p><a href="https://www.securityweek.com/solana-web3-js-library-backdoored-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solana-web3-js-library-backdoored-in-supply-chain-attack/</a></p><p><a href="https://www.darkreading.com/endpoint-security/pegasus-spyware-infections-ios-android-devices" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/pegasus-spyware-infections-ios-android-devices</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 White House Details Chinese Telecom Hacking Campaign, Pegasus Spyware Activity, Spy vs Spy, Russian Laundering Scheme </p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as White House details Salt Typhoon Telecom Hack with more news below:</p><p>• Senators call on DoD probe</p><p>• BT Investigating Breach</p><p>• Russian Money Laundering Disrupted</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/</a></p><p><a href="https://therecord.media/salt-typhoon-csrb-review" rel="noopener noreferrer" target="_blank">https://therecord.media/salt-typhoon-csrb-review</a></p><p><a href="https://therecord.media/senators-urge-dod-probe-salt-typhoon" rel="noopener noreferrer" target="_blank">https://therecord.media/senators-urge-dod-probe-salt-typhoon</a></p><p><a href="https://www.cybersecuritydive.com/news/ascension-reduces-operating-cyber-attack/734580/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/ascension-reduces-operating-cyber-attack/734580/</a></p><p><a href="https://www.securityweek.com/bt-investigating-hack-after-ransomware-group-claims-theft-of-sensitive-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/bt-investigating-hack-after-ransomware-group-claims-theft-of-sensitive-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/uk-disrupts-russian-money-laundering-networks-used-by-ransomware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uk-disrupts-russian-money-laundering-networks-used-by-ransomware/</a></p><p><a href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/</a></p><p><a href="https://www.securityweek.com/solana-web3-js-library-backdoored-in-supply-chain-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/solana-web3-js-library-backdoored-in-supply-chain-attack/</a></p><p><a href="https://www.darkreading.com/endpoint-security/pegasus-spyware-infections-ios-android-devices" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/endpoint-security/pegasus-spyware-infections-ios-android-devices</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f6091e4c-9874-438f-b94b-a462a7e2626c</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 05 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9182cb78-0294-4a24-8119-398213b40f8c/White-House-Details-Chinese-Telecom-Hacking-Campaign-Pegasus-Sp.mp3" length="28976664" type="audio/mpeg"/><itunes:duration>20:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>823</itunes:episode><podcast:episode>823</podcast:episode></item><item><title>🚨 US China Cyber Tensions Increase, Salt Typhoon Details Released, Stoli Filed Bankruptcy after Cyber attack</title><itunes:title>🚨 US China Cyber Tensions Increase, Salt Typhoon Details Released, Stoli Filed Bankruptcy after Cyber attack</itunes:title><description><![CDATA[<p>🚨 US China Cyber Tensions Increase, Salt Typhoon Details Released, Stoli Filed Bankruptcy after Cyber attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US China relations tense as cyber attacks and trade wars increase with more news below:</p><p>• Chinese Technology under export control &nbsp;&nbsp;&nbsp;</p><p>• Cloudflare domains abused by threat actors</p><p>• 1.49B in crypto stolen in 2024</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/cyberattack-and-financial-troubles-force-stolis-u-s-arm-to-file-for-bankruptcy-230f32f8?mod=cybersecurity_news_article_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/cyberattack-and-financial-troubles-force-stolis-u-s-arm-to-file-for-bankruptcy-230f32f8?mod=cybersecurity_news_article_pos2</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-shares-tips-to-block-hackers-behind-recent-telecom-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-shares-tips-to-block-hackers-behind-recent-telecom-breaches/</a></p><p><a href="https://www.securityweek.com/us-expands-list-of-chinese-technology-companies-under-export-controls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-expands-list-of-chinese-technology-companies-under-export-controls/</a></p><p><a href="https://www.cybersecuritydive.com/news/englobal-ransomware-attack/734462/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/englobal-ransomware-attack/734462/</a></p><p><a href="https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police" rel="noopener noreferrer" target="_blank">https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/</a></p><p><a href="https://therecord.media/data-broker-regulations-cfpb" rel="noopener noreferrer" target="_blank">https://therecord.media/data-broker-regulations-cfpb</a></p><p><a href="https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/</a></p><p><a href="https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/venom-spider-malware-maas-platform" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/venom-spider-malware-maas-platform</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 US China Cyber Tensions Increase, Salt Typhoon Details Released, Stoli Filed Bankruptcy after Cyber attack</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as US China relations tense as cyber attacks and trade wars increase with more news below:</p><p>• Chinese Technology under export control &nbsp;&nbsp;&nbsp;</p><p>• Cloudflare domains abused by threat actors</p><p>• 1.49B in crypto stolen in 2024</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/cyberattack-and-financial-troubles-force-stolis-u-s-arm-to-file-for-bankruptcy-230f32f8?mod=cybersecurity_news_article_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/cyberattack-and-financial-troubles-force-stolis-u-s-arm-to-file-for-bankruptcy-230f32f8?mod=cybersecurity_news_article_pos2</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-shares-tips-to-block-hackers-behind-recent-telecom-breaches/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-shares-tips-to-block-hackers-behind-recent-telecom-breaches/</a></p><p><a href="https://www.securityweek.com/us-expands-list-of-chinese-technology-companies-under-export-controls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-expands-list-of-chinese-technology-companies-under-export-controls/</a></p><p><a href="https://www.cybersecuritydive.com/news/englobal-ransomware-attack/734462/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/englobal-ransomware-attack/734462/</a></p><p><a href="https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police" rel="noopener noreferrer" target="_blank">https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/</a></p><p><a href="https://therecord.media/data-broker-regulations-cfpb" rel="noopener noreferrer" target="_blank">https://therecord.media/data-broker-regulations-cfpb</a></p><p><a href="https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/</a></p><p><a href="https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/venom-spider-malware-maas-platform" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/venom-spider-malware-maas-platform</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5a97a7a3-3767-49d6-95c7-70f7388c6cb3</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 04 Dec 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4335ebee-9492-4a1b-852c-1031c4d519a1/US-China-Cyber-Tensions-Increase-Salt-Typhoon-Details-Released-.mp3" length="25351704" type="audio/mpeg"/><itunes:duration>17:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>822</itunes:episode><podcast:episode>822</podcast:episode></item><item><title>🚨 DMM Bitcoin Losses $308M Shuts Down, Costa Rica Energy Cyber Attack, Blue Yonder Update, DDOS</title><itunes:title>🚨 DMM Bitcoin Losses $308M Shuts Down, Costa Rica Energy Cyber Attack, Blue Yonder Update, DDOS</itunes:title><description><![CDATA[<p>🚨 DMM Bitcoin Losses $308M Shuts Down, Costa Rica Energy Cyber Attack, Blue Yonder Update, DDOS</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as DMM Bitcoin Losses $308M after cyberattack with more news below:</p><p>• Interpol Cyber Ops drags 5k criminals &nbsp;&nbsp;&nbsp;</p><p>• Blue Yonder Cyber Attack update</p><p>• Russian Sentenced to Life</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/japanese-crypto-service-shuts-down" rel="noopener noreferrer" target="_blank">https://therecord.media/japanese-crypto-service-shuts-down</a></p><p><a href="https://therecord.media/costa-rica-state-energy-company-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/costa-rica-state-energy-company-ransomware</a></p><p><a href="https://www.cybersecuritydive.com/news/blue-yonder-recovery-ransomware/734275/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/blue-yonder-recovery-ransomware/734275/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/</a></p><p><a href="https://therecord.media/china-lidar-national-security-threat-report" rel="noopener noreferrer" target="_blank">https://therecord.media/china-lidar-national-security-threat-report</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/interpol-cyber-fraud-action-5k-arrests" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/interpol-cyber-fraud-action-5k-arrests</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-found-in-zabbix-network-monitoring-tool/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-found-in-zabbix-network-monitoring-tool/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/</a></p><p><a href="https://therecord.media/apple-patent-body-recognition-biometrics" rel="noopener noreferrer" target="_blank">https://therecord.media/apple-patent-body-recognition-biometrics</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 DMM Bitcoin Losses $308M Shuts Down, Costa Rica Energy Cyber Attack, Blue Yonder Update, DDOS</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as DMM Bitcoin Losses $308M after cyberattack with more news below:</p><p>• Interpol Cyber Ops drags 5k criminals &nbsp;&nbsp;&nbsp;</p><p>• Blue Yonder Cyber Attack update</p><p>• Russian Sentenced to Life</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/japanese-crypto-service-shuts-down" rel="noopener noreferrer" target="_blank">https://therecord.media/japanese-crypto-service-shuts-down</a></p><p><a href="https://therecord.media/costa-rica-state-energy-company-ransomware" rel="noopener noreferrer" target="_blank">https://therecord.media/costa-rica-state-energy-company-ransomware</a></p><p><a href="https://www.cybersecuritydive.com/news/blue-yonder-recovery-ransomware/734275/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/blue-yonder-recovery-ransomware/734275/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/</a></p><p><a href="https://therecord.media/china-lidar-national-security-threat-report" rel="noopener noreferrer" target="_blank">https://therecord.media/china-lidar-national-security-threat-report</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/interpol-cyber-fraud-action-5k-arrests" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/interpol-cyber-fraud-action-5k-arrests</a></p><p><a href="https://www.securityweek.com/critical-vulnerability-found-in-zabbix-network-monitoring-tool/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-vulnerability-found-in-zabbix-network-monitoring-tool/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/russia-sentences-hydra-dark-web-market-leader-to-life-in-prison/</a></p><p><a href="https://therecord.media/apple-patent-body-recognition-biometrics" rel="noopener noreferrer" target="_blank">https://therecord.media/apple-patent-body-recognition-biometrics</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">62440bb1-5038-448f-b07b-c7a4a871f0ff</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 03 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/fff689a2-1715-41d1-9a8e-7da52ef65b9d/DMM-Bitcoin-Losses-308M-Shuts-Down-Costa-Rica-Energy-Cyber-Atta.mp3" length="23344873" type="audio/mpeg"/><itunes:duration>16:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>821</itunes:episode><podcast:episode>821</podcast:episode></item><item><title>🚨 T-Mobile Shares Salt Typhoon Hack Details, Uganda Central Bank Hack, CrowdStrike Q3 Results</title><itunes:title>🚨 T-Mobile Shares Salt Typhoon Hack Details, Uganda Central Bank Hack, CrowdStrike Q3 Results</itunes:title><description><![CDATA[<p>🚨 T-Mobile Shares Salt Typhoon Hack Details, Uganda Central Bank Hack, CrowdStrike Q3 Results</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as T-Mobile shares more details on the Salt Typhoon Hack with more news below:</p><p>• Skimmer Malware targets Magento Sites &nbsp;&nbsp;</p><p>• Hacker in Snowflake attack was US Soldier?</p><p>• Russian Hacker Arrested</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/</a></p><p><a href="https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/</a></p><p><a href="https://therecord.media/uganda-cyberattack-central-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/uganda-cyberattack-central-bank</a></p><p><a href="https://www.cybersecuritydive.com/news/international-game-technology-cyberattack/733899/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/international-game-technology-cyberattack/733899/</a></p><p><a href="https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/creating-military-cyber-force-75844bf5?mod=cybersecurity_news_article_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/creating-military-cyber-force-75844bf5?mod=cybersecurity_news_article_pos3</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-retains-customers/734203/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-retains-customers/734203/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/</a></p><p><a href="https://therecord.media/bulgarians-plead-guilty-uk-spying-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/bulgarians-plead-guilty-uk-spying-russia</a></p><p><a href="https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 T-Mobile Shares Salt Typhoon Hack Details, Uganda Central Bank Hack, CrowdStrike Q3 Results</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>&nbsp;</p><p>Today’s episode will discuss the latest news as T-Mobile shares more details on the Salt Typhoon Hack with more news below:</p><p>• Skimmer Malware targets Magento Sites &nbsp;&nbsp;</p><p>• Hacker in Snowflake attack was US Soldier?</p><p>• Russian Hacker Arrested</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/</a></p><p><a href="https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/</a></p><p><a href="https://therecord.media/uganda-cyberattack-central-bank" rel="noopener noreferrer" target="_blank">https://therecord.media/uganda-cyberattack-central-bank</a></p><p><a href="https://www.cybersecuritydive.com/news/international-game-technology-cyberattack/733899/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/international-game-technology-cyberattack/733899/</a></p><p><a href="https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday</a></p><p><a href="https://www.wsj.com/tech/cybersecurity/creating-military-cyber-force-75844bf5?mod=cybersecurity_news_article_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/cybersecurity/creating-military-cyber-force-75844bf5?mod=cybersecurity_news_article_pos3</a></p><p><a href="https://www.cybersecuritydive.com/news/crowdstrike-retains-customers/734203/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/crowdstrike-retains-customers/734203/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/</a></p><p><a href="https://therecord.media/bulgarians-plead-guilty-uk-spying-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/bulgarians-plead-guilty-uk-spying-russia</a></p><p><a href="https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">8b994b57-3d3d-46fe-ad5d-95a51c26d708</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 02 Dec 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6f1e6151-2392-4e22-92e8-8ad59c90f092/T-Mobile-Shares-Salt-Typhoon-Hack-Details-Uganda-Central-Bank-H.mp3" length="25944162" type="audio/mpeg"/><itunes:duration>18:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>820</itunes:episode><podcast:episode>820</podcast:episode></item><item><title>🚨 Palo Alto &amp; SonicWall VPN Attack, Salt Typhoon &amp; Internal Threats, Israel VC Funding, Cybercrime Op</title><itunes:title>🚨 Palo Alto &amp; SonicWall VPN Attack, Salt Typhoon &amp; Internal Threats, Israel VC Funding, Cybercrime Op</itunes:title><description><![CDATA[<p>🚨 Palo Alto &amp; SonicWall VPN Attack, Salt Typhoon &amp; Internal Threats, Israel VC Funding, Cybercrime Op &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products<strong> </strong>with more news below:</p><p>• VMware Aria Patch &nbsp;</p><p>• 1000 Arrested in Anti Cybercrime &nbsp;&nbsp;</p><p>• MacOS Malware Leaked &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/</a></p><p><a href="https://therecord.media/former-verizon-worker-sentenced-china" rel="noopener noreferrer" target="_blank">https://therecord.media/former-verizon-worker-sentenced-china</a></p><p><a href="https://www.darkreading.com/application-security/israel-defies-downturn-security-funding" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/israel-defies-downturn-security-funding</a></p><p><a href="https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/</a></p><p><a href="https://www.securityweek.com/projectsend-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/projectsend-vulnerability-exploited-in-the-wild/</a></p><p><a href="https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/</a></p><p><a href="https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/</a></p><p><a href="https://www.bankinfosecurity.com/victims-must-disclose-ransom-payments-under-australian-law-a-26918" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/victims-must-disclose-ransom-payments-under-australian-law-a-26918</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Palo Alto &amp; SonicWall VPN Attack, Salt Typhoon &amp; Internal Threats, Israel VC Funding, Cybercrime Op &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products<strong> </strong>with more news below:</p><p>• VMware Aria Patch &nbsp;</p><p>• 1000 Arrested in Anti Cybercrime &nbsp;&nbsp;</p><p>• MacOS Malware Leaked &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/</a></p><p><a href="https://therecord.media/former-verizon-worker-sentenced-china" rel="noopener noreferrer" target="_blank">https://therecord.media/former-verizon-worker-sentenced-china</a></p><p><a href="https://www.darkreading.com/application-security/israel-defies-downturn-security-funding" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/israel-defies-downturn-security-funding</a></p><p><a href="https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/</a></p><p><a href="https://www.securityweek.com/projectsend-vulnerability-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/projectsend-vulnerability-exploited-in-the-wild/</a></p><p><a href="https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/</a></p><p><a href="https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/</a></p><p><a href="https://www.bankinfosecurity.com/victims-must-disclose-ransom-payments-under-australian-law-a-26918" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/victims-must-disclose-ransom-payments-under-australian-law-a-26918</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">08e0b6df-9f2d-4089-ac54-174e5de487a0</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 27 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d5136c74-5a9d-4790-bcc0-00de123aebac/Palo-Alto-SonicWall-VPN-Attack-Salt-Typhoon-Internal-Threats-Is.mp3" length="23353651" type="audio/mpeg"/><itunes:duration>16:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>819</itunes:episode><podcast:episode>819</podcast:episode></item><item><title>🚨 Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving, Salt Typhoon Malware, Geico Fined for Breach</title><itunes:title>🚨 Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving, Salt Typhoon Malware, Geico Fined for Breach</itunes:title><description><![CDATA[<p>🚨 Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving, Salt Typhoon Malware, Geico Fined for Breach &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving with more news below:</p><p>• Zyxel Firewalls exploited in attacks</p><p>• Russian Attackers exploit Firefox and windows zero-day &nbsp;</p><p>• Qnap patches critical flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/</a></p><p><a href="https://www.securityweek.com/chinese-hackers-exploiting-critical-vulnerability-in-array-networks-gateways/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-exploiting-critical-vulnerability-in-array-networks-gateways/</a></p><p><a href="https://www.securityweek.com/new-york-fines-geico-and-travelers-11-million-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-york-fines-geico-and-travelers-11-million-over-data-breaches/</a></p><p><a href="https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-expose-myscada-mypro-systems-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-expose-myscada-mypro-systems-to-remote-hacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/</a></p><p><a href="https://therecord.media/uk-minister-criticized-hyperbolic-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-minister-criticized-hyperbolic-russia</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving, Salt Typhoon Malware, Geico Fined for Breach &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Blue Yonder Cyber Attack Hits Supply Chain Before Thanksgiving with more news below:</p><p>• Zyxel Firewalls exploited in attacks</p><p>• Russian Attackers exploit Firefox and windows zero-day &nbsp;</p><p>• Qnap patches critical flaw</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/</a></p><p><a href="https://www.securityweek.com/chinese-hackers-exploiting-critical-vulnerability-in-array-networks-gateways/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-exploiting-critical-vulnerability-in-array-networks-gateways/</a></p><p><a href="https://www.securityweek.com/new-york-fines-geico-and-travelers-11-million-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-york-fines-geico-and-travelers-11-million-over-data-breaches/</a></p><p><a href="https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/</a></p><p><a href="https://www.securityweek.com/vulnerabilities-expose-myscada-mypro-systems-to-remote-hacking/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vulnerabilities-expose-myscada-mypro-systems-to-remote-hacking/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/</a></p><p><a href="https://therecord.media/uk-minister-criticized-hyperbolic-russia" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-minister-criticized-hyperbolic-russia</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p>&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">fa2426fd-82f7-416e-a161-af745f582d2f</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 26 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ae31510-2900-445a-90b9-0a44c90e2f4d/Blue-Yonder-Cyber-Attack-Hits-Supply-Chain-Before-Thanksgiving-.mp3" length="26601820" type="audio/mpeg"/><itunes:duration>18:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>818</itunes:episode><podcast:episode>818</podcast:episode></item><item><title>🚨 2000 Palo Alto Servers Hack in Dispute, Russian Nearest Neighbor Attack, Microlise Data Breach, Fortinet VPN</title><itunes:title>🚨 2000 Palo Alto Servers Hack in Dispute, Russian Nearest Neighbor Attack, Microlise Data Breach, Fortinet VPN</itunes:title><description><![CDATA[<p>🚨 2000 Palo Alto Servers Hack in Dispute, Russian Nearest Neighbor Attack, Microlise Data Breach, Fortinet VPN &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Palo Alto disputes 2000 firewall hacked from Zero days with more news below:</p><p>• Chinese Linux Malware Target &nbsp;</p><p>• Microsoft Disrupts ONNX Phishing &nbsp;</p><p>• Thailand Busts SMS Blaster</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-disputes-shadowserver-firewall-exploit-scans/733728/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/palo-alto-networks-disputes-shadowserver-firewall-exploit-scans/733728/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-us-firm-over-wi-fi-from-russia-in-nearest-neighbor-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-us-firm-over-wi-fi-from-russia-in-nearest-neighbor-attack/</a></p><p><a href="https://therecord.media/china-hackers-linux-malware-target" rel="noopener noreferrer" target="_blank">https://therecord.media/china-hackers-linux-malware-target</a></p><p><a href="https://www.securityweek.com/microlise-confirms-data-breach-as-ransomware-group-steps-forward/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microlise-confirms-data-breach-as-ransomware-group-steps-forward/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-disrupts-onnx-phishing-service-names-its-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-disrupts-onnx-phishing-service-names-its-operator/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/</a></p><p><a href="https://www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/</a></p><p><a href="https://therecord.media/tsa-facial-recognition-tech-senators-call-for-audits" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-facial-recognition-tech-senators-call-for-audits</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>&nbsp;✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 2000 Palo Alto Servers Hack in Dispute, Russian Nearest Neighbor Attack, Microlise Data Breach, Fortinet VPN &nbsp;</p><p>🎙️ Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Palo Alto disputes 2000 firewall hacked from Zero days with more news below:</p><p>• Chinese Linux Malware Target &nbsp;</p><p>• Microsoft Disrupts ONNX Phishing &nbsp;</p><p>• Thailand Busts SMS Blaster</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-disputes-shadowserver-firewall-exploit-scans/733728/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/palo-alto-networks-disputes-shadowserver-firewall-exploit-scans/733728/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-us-firm-over-wi-fi-from-russia-in-nearest-neighbor-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-breach-us-firm-over-wi-fi-from-russia-in-nearest-neighbor-attack/</a></p><p><a href="https://therecord.media/china-hackers-linux-malware-target" rel="noopener noreferrer" target="_blank">https://therecord.media/china-hackers-linux-malware-target</a></p><p><a href="https://www.securityweek.com/microlise-confirms-data-breach-as-ransomware-group-steps-forward/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microlise-confirms-data-breach-as-ransomware-group-steps-forward/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/</a></p><p><a href="https://www.securityweek.com/microsoft-disrupts-onnx-phishing-service-names-its-operator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-disrupts-onnx-phishing-service-names-its-operator/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/</a></p><p><a href="https://www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/</a></p><p><a href="https://therecord.media/tsa-facial-recognition-tech-senators-call-for-audits" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-facial-recognition-tech-senators-call-for-audits</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>&nbsp;✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews&nbsp;</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">993497ee-cebc-4af8-b5e5-312bc02c8038</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 25 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/50292a1f-270a-4aba-b261-34fcda5d59fb/2000-Palo-Alto-Servers-Hack-in-Dispute-Russian-Nearest-Neighbor.mp3" length="24292178" type="audio/mpeg"/><itunes:duration>16:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>817</itunes:episode><podcast:episode>817</podcast:episode></item><item><title>🚨 Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS &amp; TSA Cyber Woes</title><itunes:title>🚨 Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS &amp; TSA Cyber Woes</itunes:title><description><![CDATA[<p>🚨 Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS &amp; TSA Cyber Woes &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Finastra investigates data breach with more news below:</p><p>• French Hospital Cyberattack exposes health data</p><p>• TSA Cyber woes continues</p><p>• Password spray attacks &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/</a></p><p><a href="https://www.cybersecuritydive.com/news/healthcare-cybersecurity-policy-challenges/733466/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/healthcare-cybersecurity-policy-challenges/733466/</a></p><p><a href="https://www.bankinfosecurity.com/coast-guard-warns-continued-risks-in-chinese-port-cranes-a-26865" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/coast-guard-warns-continued-risks-in-chinese-port-cranes-a-26865</a></p><p><a href="https://therecord.media/tsa-not-monitoring-transportation-ransomware-efforts-hearing-gao" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-not-monitoring-transportation-ransomware-efforts-hearing-gao</a></p><p><a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/</a></p><p><a href="https://www.securityweek.com/exploitation-attempts-target-citrix-session-recording-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-attempts-target-citrix-session-recording-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/password-spray-attacks-targeted/733460/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/password-spray-attacks-targeted/733460/</a></p><p><a href="https://therecord.media/five-scattered-spider-members-charged-breaches-11-million-theft" rel="noopener noreferrer" target="_blank">https://therecord.media/five-scattered-spider-members-charged-breaches-11-million-theft</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Finastra Investigates Data Breach, 2024 25 Most Dangerous Software Weaknesses, HHS &amp; TSA Cyber Woes &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Finastra investigates data breach with more news below:</p><p>• French Hospital Cyberattack exposes health data</p><p>• TSA Cyber woes continues</p><p>• Password spray attacks &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/</a></p><p><a href="https://www.cybersecuritydive.com/news/healthcare-cybersecurity-policy-challenges/733466/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/healthcare-cybersecurity-policy-challenges/733466/</a></p><p><a href="https://www.bankinfosecurity.com/coast-guard-warns-continued-risks-in-chinese-port-cranes-a-26865" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/coast-guard-warns-continued-risks-in-chinese-port-cranes-a-26865</a></p><p><a href="https://therecord.media/tsa-not-monitoring-transportation-ransomware-efforts-hearing-gao" rel="noopener noreferrer" target="_blank">https://therecord.media/tsa-not-monitoring-transportation-ransomware-efforts-hearing-gao</a></p><p><a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/</a></p><p><a href="https://www.securityweek.com/exploitation-attempts-target-citrix-session-recording-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/exploitation-attempts-target-citrix-session-recording-vulnerabilities/</a></p><p><a href="https://www.cybersecuritydive.com/news/password-spray-attacks-targeted/733460/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/password-spray-attacks-targeted/733460/</a></p><p><a href="https://therecord.media/five-scattered-spider-members-charged-breaches-11-million-theft" rel="noopener noreferrer" target="_blank">https://therecord.media/five-scattered-spider-members-charged-breaches-11-million-theft</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">245bf50a-96f7-4231-b42d-8bc709c8f75b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 21 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d2fb7ce5-6f14-49e2-a8d0-f893fab544f4/Finastra-Investigates-Data-Breach-2024-25-Most-Dangerous-Softwa.mp3" length="26228165" type="audio/mpeg"/><itunes:duration>18:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>816</itunes:episode><podcast:episode>816</podcast:episode></item><item><title>🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats</title><itunes:title>🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats</itunes:title><description><![CDATA[<p>🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Apple Fixes two zerodays for MacOS with Intel with more news below:</p><p>• Cargill Kronos Lawsuit Dismissed</p><p>• CISA Tags Progress Kemp Loadmaster Flaw</p><p>• Oracle Patches Exploited Zeroday</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/</a></p><p><a href="https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html</a></p><p><a href="https://www.securityweek.com/ford-says-leaked-data-comes-from-supplier-and-is-not-sensitive/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ford-says-leaked-data-comes-from-supplier-and-is-not-sensitive/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/d-link-urges-users-to-retire-vpn-routers-impacted-by-unfixed-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/d-link-urges-users-to-retire-vpn-routers-impacted-by-unfixed-rce-flaw/</a></p><p><a href="https://www.bankinfosecurity.com/us-agencies-urged-to-combat-growing-chinese-cyberthreat-a-26858" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-agencies-urged-to-combat-growing-chinese-cyberthreat-a-26858</a></p><p><a href="https://therecord.media/nso-group-whatsapp-case-documents" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-group-whatsapp-case-documents</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Apple Fixes two zerodays for MacOS with Intel with more news below:</p><p>• Cargill Kronos Lawsuit Dismissed</p><p>• CISA Tags Progress Kemp Loadmaster Flaw</p><p>• Oracle Patches Exploited Zeroday</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/</a></p><p><a href="https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html</a></p><p><a href="https://www.securityweek.com/ford-says-leaked-data-comes-from-supplier-and-is-not-sensitive/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ford-says-leaked-data-comes-from-supplier-and-is-not-sensitive/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/d-link-urges-users-to-retire-vpn-routers-impacted-by-unfixed-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/d-link-urges-users-to-retire-vpn-routers-impacted-by-unfixed-rce-flaw/</a></p><p><a href="https://www.bankinfosecurity.com/us-agencies-urged-to-combat-growing-chinese-cyberthreat-a-26858" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/us-agencies-urged-to-combat-growing-chinese-cyberthreat-a-26858</a></p><p><a href="https://therecord.media/nso-group-whatsapp-case-documents" rel="noopener noreferrer" target="_blank">https://therecord.media/nso-group-whatsapp-case-documents</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never-Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #databreach #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c27a5558-6b62-4cde-afd5-162bd05ede3a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 20 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9dedcfa3-ae13-402c-8ddd-16d1beaef658/Apple-Fixes-MacOS-Zerodays-Chinese-Telecom-Attackers-Leverage-S.mp3" length="24757367" type="audio/mpeg"/><itunes:duration>17:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>815</itunes:episode><podcast:episode>815</podcast:episode></item><item><title>🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks</title><itunes:title>🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks</itunes:title><description><![CDATA[<p>🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Palo Alto Networks patches zeroday with more news below:</p><p>• 300 Drinking Water systems exposed to attacks</p><p>• Fortinet Zeroday exploited in Malware attacked</p><p>• LLM Jailbreak</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/</a></p><p><a href="https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/</a></p><p><a href="https://www.securityweek.com/ford-investigating-potential-breach-after-hackers-claim-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ford-investigating-potential-breach-after-hackers-claim-data-theft/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/jen-easterly-cisa-director-resign-inauguration-day" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/jen-easterly-cisa-director-resign-inauguration-day</a></p><p><a href="https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/</a></p><p><a href="https://www.securityweek.com/fortinet-vpn-zero-day-exploited-in-malware-attacks-remains-unpatched-report/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-vpn-zero-day-exploited-in-malware-attacks-remains-unpatched-report/</a></p><p><a href="https://www.securityweek.com/vmware-discloses-exploitation-of-hard-to-fix-vcenter-server-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-discloses-exploitation-of-hard-to-fix-vcenter-server-flaw/</a></p><p><a href="https://www.bankinfosecurity.com/its-alarmingly-easy-to-jailbreak-llm-controlled-robots-a-26837" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/its-alarmingly-easy-to-jailbreak-llm-controlled-robots-a-26837</a></p><p><a href="https://therecord.media/ai-company-loses-250000-in-bec-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/ai-company-loses-250000-in-bec-cyberattack</a></p><p><a href="https://cyberscoop.com/alleged-russian-phobos-ransomware-administrator-extradited-to-u-s-in-custody/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/alleged-russian-phobos-ransomware-administrator-extradited-to-u-s-in-custody/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Palo Alto Networks patches zeroday with more news below:</p><p>• 300 Drinking Water systems exposed to attacks</p><p>• Fortinet Zeroday exploited in Malware attacked</p><p>• LLM Jailbreak</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/</a></p><p><a href="https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/cargill-kronos-discrimination-suit-dismissed/732942/</a></p><p><a href="https://www.securityweek.com/ford-investigating-potential-breach-after-hackers-claim-data-theft/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ford-investigating-potential-breach-after-hackers-claim-data-theft/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/jen-easterly-cisa-director-resign-inauguration-day" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/jen-easterly-cisa-director-resign-inauguration-day</a></p><p><a href="https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/</a></p><p><a href="https://www.securityweek.com/fortinet-vpn-zero-day-exploited-in-malware-attacks-remains-unpatched-report/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fortinet-vpn-zero-day-exploited-in-malware-attacks-remains-unpatched-report/</a></p><p><a href="https://www.securityweek.com/vmware-discloses-exploitation-of-hard-to-fix-vcenter-server-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-discloses-exploitation-of-hard-to-fix-vcenter-server-flaw/</a></p><p><a href="https://www.bankinfosecurity.com/its-alarmingly-easy-to-jailbreak-llm-controlled-robots-a-26837" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/its-alarmingly-easy-to-jailbreak-llm-controlled-robots-a-26837</a></p><p><a href="https://therecord.media/ai-company-loses-250000-in-bec-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/ai-company-loses-250000-in-bec-cyberattack</a></p><p><a href="https://cyberscoop.com/alleged-russian-phobos-ransomware-administrator-extradited-to-u-s-in-custody/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/alleged-russian-phobos-ransomware-administrator-extradited-to-u-s-in-custody/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6b74cd6f-effe-434e-9f28-6f37b45758d7</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 19 Nov 2024 09:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c7185b74-4ea8-4b92-90cb-9b893008bb34/Cargill-Cyberattack-lawsuit-dismissed-Palo-Alto-Patches-Zeroday.mp3" length="23816331" type="audio/mpeg"/><itunes:duration>16:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>814</itunes:episode><podcast:episode>814</podcast:episode></item><item><title>🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit</title><itunes:title>🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit</itunes:title><description><![CDATA[<p>🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as T-Mobile Hacked in Chinese Telcom breach with more news below:</p><p>• NSO Hacked WhatsApp after lawsuit</p><p>• WordPress Plug in Flaw</p><p>• WazirX Crypto suspect Arrested</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-confirms-new-firewall-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-confirms-new-firewall-zero-day-exploitation/</a></p><p><a href="https://cyberscoop.com/nso-group-used-whatsapp-exploits-after-the-messaging-app-sued-the-spyware-developer-court-filing-says/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/nso-group-used-whatsapp-exploits-after-the-messaging-app-sued-the-spyware-developer-court-filing-says/</a></p><p><a href="https://www.cybersecuritydive.com/news/veeam-cve-exploit-frag-ransomware/732670/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/veeam-cve-exploit-frag-ransomware/732670/</a></p><p><a href="https://www.securityweek.com/critical-plugin-flaw-exposed-4-million-wordpress-websites-to-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-plugin-flaw-exposed-4-million-wordpress-websites-to-takeover/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/microsoft-power-pages-millions-private-records" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/microsoft-power-pages-millions-private-records</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/</a></p><p><a href="https://therecord.media/wazirx-crypto-exchange-hack-suspect-arrested-india" rel="noopener noreferrer" target="_blank">https://therecord.media/wazirx-crypto-exchange-hack-suspect-arrested-india</a></p><p><a href="https://www.securityweek.com/homeland-security-department-releases-framework-for-using-ai-in-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/homeland-security-department-releases-framework-for-using-ai-in-critical-infrastructure/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as T-Mobile Hacked in Chinese Telcom breach with more news below:</p><p>• NSO Hacked WhatsApp after lawsuit</p><p>• WordPress Plug in Flaw</p><p>• WazirX Crypto suspect Arrested</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-confirms-new-firewall-zero-day-exploitation/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-confirms-new-firewall-zero-day-exploitation/</a></p><p><a href="https://cyberscoop.com/nso-group-used-whatsapp-exploits-after-the-messaging-app-sued-the-spyware-developer-court-filing-says/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/nso-group-used-whatsapp-exploits-after-the-messaging-app-sued-the-spyware-developer-court-filing-says/</a></p><p><a href="https://www.cybersecuritydive.com/news/veeam-cve-exploit-frag-ransomware/732670/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/veeam-cve-exploit-frag-ransomware/732670/</a></p><p><a href="https://www.securityweek.com/critical-plugin-flaw-exposed-4-million-wordpress-websites-to-takeover/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/critical-plugin-flaw-exposed-4-million-wordpress-websites-to-takeover/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/microsoft-power-pages-millions-private-records" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/microsoft-power-pages-millions-private-records</a></p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/</a></p><p><a href="https://therecord.media/wazirx-crypto-exchange-hack-suspect-arrested-india" rel="noopener noreferrer" target="_blank">https://therecord.media/wazirx-crypto-exchange-hack-suspect-arrested-india</a></p><p><a href="https://www.securityweek.com/homeland-security-department-releases-framework-for-using-ai-in-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/homeland-security-department-releases-framework-for-using-ai-in-critical-infrastructure/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">4e9b4286-3a88-4d43-8433-0e73ec9d4344</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 18 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/99f9f989-5d33-49ff-afbf-6c84da117297/T-Mobile-Hacked-in-Chinese-Telecom-Breach-Palo-Alto-Networks-Fi.mp3" length="24239515" type="audio/mpeg"/><itunes:duration>16:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>813</itunes:episode><podcast:episode>813</podcast:episode></item><item><title>🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia</title><itunes:title>🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia</itunes:title><description><![CDATA[<p>🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as CISA and FBI Confirm Telecom breach with more news below:</p><p>• Windows Zeroday exploited by Russia &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>• NIST CVE Backlog &nbsp;</p><p>• Intel &amp; AMD November Patch</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-compromised-us-government-officials-private-communications-in-recent-telecom-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-compromised-us-government-officials-private-communications-in-recent-telecom-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/</a></p><p><a href="https://www.securityweek.com/windows-zero-day-exploited-by-russia-triggered-with-file-drag-and-drop-delete-actions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/windows-zero-day-exploited-by-russia-triggered-with-file-drag-and-drop-delete-actions/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-publishes-44-and-amd-publishes-8-new-advisories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-intel-publishes-44-and-amd-publishes-8-new-advisories/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-50-vulnerabilities-across-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-50-vulnerabilities-across-several-products/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-bug-in-eol-d-link-nas-devices-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-bug-in-eol-d-link-nas-devices-now-exploited-in-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/toolkit-expands-apt41s-surveillance-powers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/toolkit-expands-apt41s-surveillance-powers</a></p><p><a href="https://www.securityweek.com/nist-explains-why-it-failed-to-clear-cve-backlog/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-explains-why-it-failed-to-clear-cve-backlog/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-indicts-snowflake-hackers-who-extorted-25-million-from-3-victims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-indicts-snowflake-hackers-who-extorted-25-million-from-3-victims/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as CISA and FBI Confirm Telecom breach with more news below:</p><p>• Windows Zeroday exploited by Russia &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>• NIST CVE Backlog &nbsp;</p><p>• Intel &amp; AMD November Patch</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-compromised-us-government-officials-private-communications-in-recent-telecom-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/chinese-hackers-compromised-us-government-officials-private-communications-in-recent-telecom-breach/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/</a></p><p><a href="https://www.securityweek.com/windows-zero-day-exploited-by-russia-triggered-with-file-drag-and-drop-delete-actions/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/windows-zero-day-exploited-by-russia-triggered-with-file-drag-and-drop-delete-actions/</a></p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-publishes-44-and-amd-publishes-8-new-advisories/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chipmaker-patch-tuesday-intel-publishes-44-and-amd-publishes-8-new-advisories/</a></p><p><a href="https://www.securityweek.com/ivanti-patches-50-vulnerabilities-across-several-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-patches-50-vulnerabilities-across-several-products/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/critical-bug-in-eol-d-link-nas-devices-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/critical-bug-in-eol-d-link-nas-devices-now-exploited-in-attacks/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/toolkit-expands-apt41s-surveillance-powers" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/toolkit-expands-apt41s-surveillance-powers</a></p><p><a href="https://www.securityweek.com/nist-explains-why-it-failed-to-clear-cve-backlog/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/nist-explains-why-it-failed-to-clear-cve-backlog/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-indicts-snowflake-hackers-who-extorted-25-million-from-3-victims/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/us-indicts-snowflake-hackers-who-extorted-25-million-from-3-victims/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">98dfb515-938e-442f-b33b-d6b1f98b9df4</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 14 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cda690aa-f4f9-433b-91c6-317102cb3c10/Chinese-Hackers-Compromised-Private-Communication-122-Million-B.mp3" length="27523420" type="audio/mpeg"/><itunes:duration>19:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>812</itunes:episode><podcast:episode>812</podcast:episode></item><item><title>🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta &amp; Amazon Confirm Breach, Volt Typhoon Botnet</title><itunes:title>🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta &amp; Amazon Confirm Breach, Volt Typhoon Botnet</itunes:title><description><![CDATA[<p>🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta &amp; Amazon Confirm Breach, Volt Typhoon Botnet &nbsp;&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Microsoft confirms zeroday after task scheduler exploit with more news below:</p><p>• ICS Patch Tuesday &nbsp;&nbsp;&nbsp;&nbsp;</p><p>• Chinese Hackers Target Tibetan Websites</p><p>• Iranian use dream job lures</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2024-patch-tuesday-fixes-4-zero-days-91-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2024-patch-tuesday-fixes-4-zero-days-91-flaws/</a></p><p><a href="https://www.securityweek.com/microsoft-confirms-zero-day-exploitation-of-task-scheduler-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-confirms-zero-day-exploitation-of-task-scheduler-flaw/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-critical-flaws-in-adobe-commerce-photoshop-indesign-illustrator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-critical-flaws-in-adobe-commerce-photoshop-indesign-illustrator/</a></p><p><a href="https://www.securityweek.com/citrix-fortinet-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/citrix-fortinet-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-cisa-schneider-siemens-rockwell/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-cisa-schneider-siemens-rockwell/</a></p><p><a href="https://therecord.media/delta-amazon-vendor-breach-confirmed" rel="noopener noreferrer" target="_blank">https://therecord.media/delta-amazon-vendor-breach-confirmed</a></p><p><a href="https://www.securityweek.com/chinese-hackers-target-tibetan-websites-in-malware-attack-cybersecurity-group-says/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-target-tibetan-websites-in-malware-attack-cybersecurity-group-says/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/volt-typhoon-rebuilds-malware-botnet-following-fbi-disruption/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/volt-typhoon-rebuilds-malware-botnet-following-fbi-disruption/</a></p><p><a href="https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html</a></p><p><a href="https://www.cybersecuritydive.com/news/biden-administration-un-cybercrime-treaty/732643/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/biden-administration-un-cybercrime-treaty/732643/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta &amp; Amazon Confirm Breach, Volt Typhoon Botnet &nbsp;&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Microsoft confirms zeroday after task scheduler exploit with more news below:</p><p>• ICS Patch Tuesday &nbsp;&nbsp;&nbsp;&nbsp;</p><p>• Chinese Hackers Target Tibetan Websites</p><p>• Iranian use dream job lures</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2024-patch-tuesday-fixes-4-zero-days-91-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2024-patch-tuesday-fixes-4-zero-days-91-flaws/</a></p><p><a href="https://www.securityweek.com/microsoft-confirms-zero-day-exploitation-of-task-scheduler-flaw/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-confirms-zero-day-exploitation-of-task-scheduler-flaw/</a></p><p><a href="https://www.securityweek.com/patch-tuesday-critical-flaws-in-adobe-commerce-photoshop-indesign-illustrator/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/patch-tuesday-critical-flaws-in-adobe-commerce-photoshop-indesign-illustrator/</a></p><p><a href="https://www.securityweek.com/citrix-fortinet-patch-high-severity-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/citrix-fortinet-patch-high-severity-vulnerabilities/</a></p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-cisa-schneider-siemens-rockwell/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-cisa-schneider-siemens-rockwell/</a></p><p><a href="https://therecord.media/delta-amazon-vendor-breach-confirmed" rel="noopener noreferrer" target="_blank">https://therecord.media/delta-amazon-vendor-breach-confirmed</a></p><p><a href="https://www.securityweek.com/chinese-hackers-target-tibetan-websites-in-malware-attack-cybersecurity-group-says/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/chinese-hackers-target-tibetan-websites-in-malware-attack-cybersecurity-group-says/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/volt-typhoon-rebuilds-malware-botnet-following-fbi-disruption/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/volt-typhoon-rebuilds-malware-botnet-following-fbi-disruption/</a></p><p><a href="https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/iranian-hackers-use-dream-job-lures-to.html</a></p><p><a href="https://www.cybersecuritydive.com/news/biden-administration-un-cybercrime-treaty/732643/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/biden-administration-un-cybercrime-treaty/732643/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">737082fb-7b8d-4253-947f-fb40558aba0e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 13 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0ae202a-88cd-47ec-b2ac-403f11fb0148/Microsoft-Confirms-Zeroday-Patch-Tuesday-Recap-Delta-Amazon-Con.mp3" length="21042754" type="audio/mpeg"/><itunes:duration>14:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>811</itunes:episode><podcast:episode>811</podcast:episode></item><item><title>🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning</title><itunes:title>🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning</itunes:title><description><![CDATA[<p>🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning &nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as The Hack on US Telecom by China Escalates with more news below:</p><p>• Halliburton Breach Cost &nbsp;&nbsp;&nbsp;</p><p>• Security Flaws in ML Toolkits</p><p>• Ahold Delhaize Cyberattack &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273?mod=cybersecurity_news_article_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273?mod=cybersecurity_news_article_pos3</a></p><p><a href="https://www.securityweek.com/cyberattack-cost-oil-giant-halliburton-35-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-cost-oil-giant-halliburton-35-million/</a></p><p><a href="https://www.cybersecuritydive.com/news/grocery-ahold-delhaize-cyberattack/732562/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/grocery-ahold-delhaize-cyberattack/732562/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hibp-notifies-57-million-people-of-hot-topic-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hibp-notifies-57-million-people-of-hot-topic-data-breach/</a></p><p><a href="https://www.securityweek.com/fbi-warns-us-organizations-of-fake-emergency-data-requests-made-by-cybercriminals/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-warns-us-organizations-of-fake-emergency-data-requests-made-by-cybercriminals/</a></p><p><a href="https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html</a></p><p><a href="https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html</a></p><p><a href="https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected</a></p><p><a href="https://www.securityweek.com/ip-spoofing-attack-tried-to-disrupt-tor-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ip-spoofing-attack-tried-to-disrupt-tor-network/</a></p><p><a href="https://www.darkreading.com/application-security/facebook-supreme-court-dismiss-cambridge-analytica-lawsuit" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/facebook-supreme-court-dismiss-cambridge-analytica-lawsuit</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning &nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as The Hack on US Telecom by China Escalates with more news below:</p><p>• Halliburton Breach Cost &nbsp;&nbsp;&nbsp;</p><p>• Security Flaws in ML Toolkits</p><p>• Ahold Delhaize Cyberattack &nbsp;</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273?mod=cybersecurity_news_article_pos3" rel="noopener noreferrer" target="_blank">https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273?mod=cybersecurity_news_article_pos3</a></p><p><a href="https://www.securityweek.com/cyberattack-cost-oil-giant-halliburton-35-million/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-cost-oil-giant-halliburton-35-million/</a></p><p><a href="https://www.cybersecuritydive.com/news/grocery-ahold-delhaize-cyberattack/732562/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/grocery-ahold-delhaize-cyberattack/732562/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hibp-notifies-57-million-people-of-hot-topic-data-breach/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hibp-notifies-57-million-people-of-hot-topic-data-breach/</a></p><p><a href="https://www.securityweek.com/fbi-warns-us-organizations-of-fake-emergency-data-requests-made-by-cybercriminals/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-warns-us-organizations-of-fake-emergency-data-requests-made-by-cybercriminals/</a></p><p><a href="https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html</a></p><p><a href="https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html</a></p><p><a href="https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/flexible-structure-zip-archives-exploited-hide-malware-undetected</a></p><p><a href="https://www.securityweek.com/ip-spoofing-attack-tried-to-disrupt-tor-network/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ip-spoofing-attack-tried-to-disrupt-tor-network/</a></p><p><a href="https://www.darkreading.com/application-security/facebook-supreme-court-dismiss-cambridge-analytica-lawsuit" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/facebook-supreme-court-dismiss-cambridge-analytica-lawsuit</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">156fc4c0-8729-41b6-8005-7f18da4ddf52</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 12 Nov 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d5fc804a-2d20-4343-813b-703b184fb58a/China-Telecom-Hack-Escalates-Halliburton-Breach-Cost-35M-Hot-To.mp3" length="25966104" type="audio/mpeg"/><itunes:duration>18:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>810</itunes:episode><podcast:episode>810</podcast:episode></item><item><title>Iranian Cyberattack on Israel’s Payment Provider, Texas Oilfield Ransomware Attack, TSA Expands Cyber Rules</title><itunes:title>Iranian Cyberattack on Israel’s Payment Provider, Texas Oilfield Ransomware Attack, TSA Expands Cyber Rules</itunes:title><description><![CDATA[<p>Iranian Cyberattack on Israel’s Payment Provider, Texas Oilfield Ransomware Attack, TSA Expands Cyber Rules&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Iran attacks Israeli’s payment provider with more news below:</p><p>• Texas Oilfield Supplier Ransomware attack &nbsp;&nbsp;</p><p>• Palo Alto Vulnerability exploited in attacks</p><p>• PyPi Packages steal AWS Keys</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack</a></p><p><a href="https://www.wsj.com/articles/tsa-wants-to-expand-cyber-rules-for-pipelines-and-railroads-011b9d96?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/tsa-wants-to-expand-cyber-rules-for-pipelines-and-railroads-011b9d96?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/debt-relief-firm-forth-discloses-data-breach-impacting-1-5-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/debt-relief-firm-forth-discloses-data-breach-impacting-1-5-million-people/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-expedition-vulnerability-exploited-in-attacks-cisa-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-expedition-vulnerability-exploited-in-attacks-cisa-warns/</a></p><p><a href="https://www.securityweek.com/veeam-patches-high-severity-vulnerability-as-exploitation-of-previous-flaw-expands/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veeam-patches-high-severity-vulnerability-as-exploitation-of-previous-flaw-expands/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-pypi-package-with-37-000-downloads-steals-aws-keys/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-pypi-package-with-37-000-downloads-steals-aws-keys/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/fake-copyright-infringement-emails-rhadamanthys" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/fake-copyright-infringement-emails-rhadamanthys</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>Iranian Cyberattack on Israel’s Payment Provider, Texas Oilfield Ransomware Attack, TSA Expands Cyber Rules&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Iran attacks Israeli’s payment provider with more news below:</p><p>• Texas Oilfield Supplier Ransomware attack &nbsp;&nbsp;</p><p>• Palo Alto Vulnerability exploited in attacks</p><p>• PyPi Packages steal AWS Keys</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction" rel="noopener noreferrer" target="_blank">https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack</a></p><p><a href="https://www.wsj.com/articles/tsa-wants-to-expand-cyber-rules-for-pipelines-and-railroads-011b9d96?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/tsa-wants-to-expand-cyber-rules-for-pipelines-and-railroads-011b9d96?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.securityweek.com/debt-relief-firm-forth-discloses-data-breach-impacting-1-5-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/debt-relief-firm-forth-discloses-data-breach-impacting-1-5-million-people/</a></p><p><a href="https://www.securityweek.com/palo-alto-networks-expedition-vulnerability-exploited-in-attacks-cisa-warns/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/palo-alto-networks-expedition-vulnerability-exploited-in-attacks-cisa-warns/</a></p><p><a href="https://www.securityweek.com/veeam-patches-high-severity-vulnerability-as-exploitation-of-previous-flaw-expands/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/veeam-patches-high-severity-vulnerability-as-exploitation-of-previous-flaw-expands/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-pypi-package-with-37-000-downloads-steals-aws-keys/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-pypi-package-with-37-000-downloads-steals-aws-keys/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/fake-copyright-infringement-emails-rhadamanthys" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/fake-copyright-infringement-emails-rhadamanthys</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">85b17ebc-11b7-407b-8e4f-8effc6ca6737</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 11 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0261475e-6c23-4704-bfb0-f07cf93b2d25/Iranian-Cyberattack-on-Israel-s-Payment-Provider-Texas-Oilfield.mp3" length="21847744" type="audio/mpeg"/><itunes:duration>15:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>809</itunes:episode><podcast:episode>809</podcast:episode></item><item><title>The War on Chinese Owned Businesses Ramps Up, North Korea Targets Crypto Firms, Banking Trojans Spread</title><itunes:title>The War on Chinese Owned Businesses Ramps Up, North Korea Targets Crypto Firms, Banking Trojans Spread</itunes:title><description><![CDATA[<p>The War on Chinese Owned Businesses Ramps Up, North Korea Targets Crypto Firms, Banking Trojans Spread&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as The War on Chinese Owned Businesses Ramps Up with more news below:</p><p>• Cisco Patches Critical Vulnerability &nbsp;&nbsp;</p><p>• Android Banking Trojan &nbsp;</p><p>• CrowdStrike Acquires Adaptive Shield</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/</a></p><p><a href="https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html</a></p><p><a href="https://www.securityweek.com/canada-orders-tiktoks-canadian-business-to-be-dissolved-but-wont-block-app/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canada-orders-tiktoks-canadian-business-to-be-dissolved-but-wont-block-app/</a></p><p><a href="https://therecord.media/uk-orders-chinese-owners-scottish-semiconductor-business-divestment" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-orders-chinese-owners-scottish-semiconductor-business-divestment</a></p><p><a href="https://www.darkreading.com/threat-intelligence/chinese-gamers-targeted-winos40-framework-scam" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/chinese-gamers-targeted-winos40-framework-scam</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-industrial-networking-solution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerability-in-industrial-networking-solution/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/</a></p><p><a href="https://www.securityweek.com/android-banking-trojan-toxicpanda-targets-europe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-banking-trojan-toxicpanda-targets-europe/</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-adaptive-shield-in-reported-300-million-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-adaptive-shield-in-reported-300-million-deal/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>The War on Chinese Owned Businesses Ramps Up, North Korea Targets Crypto Firms, Banking Trojans Spread&nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as The War on Chinese Owned Businesses Ramps Up with more news below:</p><p>• Cisco Patches Critical Vulnerability &nbsp;&nbsp;</p><p>• Android Banking Trojan &nbsp;</p><p>• CrowdStrike Acquires Adaptive Shield</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/</a></p><p><a href="https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html</a></p><p><a href="https://www.securityweek.com/canada-orders-tiktoks-canadian-business-to-be-dissolved-but-wont-block-app/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canada-orders-tiktoks-canadian-business-to-be-dissolved-but-wont-block-app/</a></p><p><a href="https://therecord.media/uk-orders-chinese-owners-scottish-semiconductor-business-divestment" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-orders-chinese-owners-scottish-semiconductor-business-divestment</a></p><p><a href="https://www.darkreading.com/threat-intelligence/chinese-gamers-targeted-winos40-framework-scam" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/chinese-gamers-targeted-winos40-framework-scam</a></p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-industrial-networking-solution/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-critical-vulnerability-in-industrial-networking-solution/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/</a></p><p><a href="https://www.securityweek.com/android-banking-trojan-toxicpanda-targets-europe/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/android-banking-trojan-toxicpanda-targets-europe/</a></p><p><a href="https://www.securityweek.com/crowdstrike-to-acquire-adaptive-shield-in-reported-300-million-deal/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/crowdstrike-to-acquire-adaptive-shield-in-reported-300-million-deal/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">3c9a27ff-ab9c-4f7b-8fff-54883b9b3755</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 07 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e07dd43a-5919-4484-a090-53cfb20ef36b/The-War-on-Chinese-Owned-Businesses-Ramps-Up-North-Korea-Target.mp3" length="23779342" type="audio/mpeg"/><itunes:duration>16:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>808</itunes:episode><podcast:episode>808</podcast:episode></item><item><title>🚨 China Hack Enabled Spying on US Officials, Schneider Electric Confirms Breach, Election Security Review</title><itunes:title>🚨 China Hack Enabled Spying on US Officials, Schneider Electric Confirms Breach, Election Security Review</itunes:title><description><![CDATA[<p>🚨 China Hack Enabled Spying on US Officials, Schneider Electric Confirms Breach, Election Security Review &nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as China Hack Enabled Spying on US Officials with more news below:</p><p>• Washington Courts Outage &nbsp;&nbsp;</p><p>• Ransomware disrupts Georgia Hospitals</p><p>• Snowflake Suspect Captured</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/china-hack-enabled-vast-spying-on-u-s-officials-likely-ensnaring-thousands-of-contacts-1340ba4a?mod=hp_lead_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/china-hack-enabled-vast-spying-on-u-s-officials-likely-ensnaring-thousands-of-contacts-1340ba4a?mod=hp_lead_pos4</a></p><p><a href="https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/</a></p><p><a href="https://www.securityweek.com/cyberattack-blamed-for-statewide-washington-courts-outage/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-blamed-for-statewide-washington-courts-outage/</a></p><p><a href="https://www.securityweek.com/ransomware-attack-disrupts-georgia-hospitals-access-to-health-records/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-attack-disrupts-georgia-hospitals-access-to-health-records/</a></p><p><a href="https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/</a></p><p><a href="https://therecord.media/cisa-easterly-no-evidence-of-malicious-election-activity" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-easterly-no-evidence-of-malicious-election-activity</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 China Hack Enabled Spying on US Officials, Schneider Electric Confirms Breach, Election Security Review &nbsp;&nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as China Hack Enabled Spying on US Officials with more news below:</p><p>• Washington Courts Outage &nbsp;&nbsp;</p><p>• Ransomware disrupts Georgia Hospitals</p><p>• Snowflake Suspect Captured</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/politics/national-security/china-hack-enabled-vast-spying-on-u-s-officials-likely-ensnaring-thousands-of-contacts-1340ba4a?mod=hp_lead_pos4" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/china-hack-enabled-vast-spying-on-u-s-officials-likely-ensnaring-thousands-of-contacts-1340ba4a?mod=hp_lead_pos4</a></p><p><a href="https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/</a></p><p><a href="https://www.securityweek.com/cyberattack-blamed-for-statewide-washington-courts-outage/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyberattack-blamed-for-statewide-washington-courts-outage/</a></p><p><a href="https://www.securityweek.com/ransomware-attack-disrupts-georgia-hospitals-access-to-health-records/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ransomware-attack-disrupts-georgia-hospitals-access-to-health-records/</a></p><p><a href="https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/</a></p><p><a href="https://therecord.media/cisa-easterly-no-evidence-of-malicious-election-activity" rel="noopener noreferrer" target="_blank">https://therecord.media/cisa-easterly-no-evidence-of-malicious-election-activity</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">14294a34-90e7-41bf-b101-f2702e0af35e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 06 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/15763d23-4d84-4e6e-afee-f503a7400147/China-Hack-Enabled-Spying-on-US-Officials-Schneider-Electric-Br.mp3" length="24991842" type="audio/mpeg"/><itunes:duration>17:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>807</itunes:episode><podcast:episode>807</podcast:episode></item><item><title>🚨 Nokia &amp; Schneider Electric Investigate Data Breaches, MoneyGram Replaces Leadership, Spyware Legal Barriers</title><itunes:title>🚨 Nokia &amp; Schneider Electric Investigate Data Breaches, MoneyGram Replaces Leadership, Spyware Legal Barriers</itunes:title><description><![CDATA[<p>🚨 Nokia &amp; Schneider Electric Investigate Data Breaches, MoneyGram Replaces Leadership, Spyware Legal Barriers &nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Nokia &amp; Schneider Electric investigate claims of data breach with more news below:</p><p>• Cisco Notified Customers of Data Breach &nbsp;</p><p>• SEC Moves to get more testimony against SolarWinds</p><p>• Google Patches Vulnerabilities</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/</a></p><p><a href="https://www.securityweek.com/schneider-electric-launches-probe-after-hackers-claim-theft-of-user-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/schneider-electric-launches-probe-after-hackers-claim-theft-of-user-data/</a></p><p><a href="https://therecord.media/cisco-notifies-limited-set-of-customers-hacker-accessed-non-public-info" rel="noopener noreferrer" target="_blank">https://therecord.media/cisco-notifies-limited-set-of-customers-hacker-accessed-non-public-info</a></p><p><a href="https://www.cybersecuritydive.com/news/moneygram-ceo-change-soohoo-former-walmart-executive/731620/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/moneygram-ceo-change-soohoo-former-walmart-executive/731620/</a></p><p><a href="https://www.bankinfosecurity.com/sec-moves-to-get-foreign-testimony-in-solarwinds-fraud-case-a-26721" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/sec-moves-to-get-foreign-testimony-in-solarwinds-fraud-case-a-26721</a></p><p><a href="https://www.securityweek.com/google-patches-two-android-vulnerabilities-exploited-in-targeted-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-two-android-vulnerabilities-exploited-in-targeted-attacks/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/okta-fixes-auth-bypass-bug-three-month-lull" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/okta-fixes-auth-bypass-bug-three-month-lull</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes</a></p><p><a href="https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Nokia &amp; Schneider Electric Investigate Data Breaches, MoneyGram Replaces Leadership, Spyware Legal Barriers &nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Nokia &amp; Schneider Electric investigate claims of data breach with more news below:</p><p>• Cisco Notified Customers of Data Breach &nbsp;</p><p>• SEC Moves to get more testimony against SolarWinds</p><p>• Google Patches Vulnerabilities</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/</a></p><p><a href="https://www.securityweek.com/schneider-electric-launches-probe-after-hackers-claim-theft-of-user-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/schneider-electric-launches-probe-after-hackers-claim-theft-of-user-data/</a></p><p><a href="https://therecord.media/cisco-notifies-limited-set-of-customers-hacker-accessed-non-public-info" rel="noopener noreferrer" target="_blank">https://therecord.media/cisco-notifies-limited-set-of-customers-hacker-accessed-non-public-info</a></p><p><a href="https://www.cybersecuritydive.com/news/moneygram-ceo-change-soohoo-former-walmart-executive/731620/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/moneygram-ceo-change-soohoo-former-walmart-executive/731620/</a></p><p><a href="https://www.bankinfosecurity.com/sec-moves-to-get-foreign-testimony-in-solarwinds-fraud-case-a-26721" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/sec-moves-to-get-foreign-testimony-in-solarwinds-fraud-case-a-26721</a></p><p><a href="https://www.securityweek.com/google-patches-two-android-vulnerabilities-exploited-in-targeted-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-two-android-vulnerabilities-exploited-in-targeted-attacks/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/okta-fixes-auth-bypass-bug-three-month-lull" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/okta-fixes-auth-bypass-bug-three-month-lull</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes</a></p><p><a href="https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">b1805a79-a07f-48b1-82ac-ae27c6cc2afd</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 05 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6c1d791f-05a7-4cdf-992b-18ca5e3c7a3f/Nokia-Schneider-Electric-Investigate-Data-Breaches-MoneyGram-Re.mp3" length="26867016" type="audio/mpeg"/><itunes:duration>18:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>806</itunes:episode><podcast:episode>806</podcast:episode></item><item><title>🚨 Sophos Battle with China, Microsoft Warns Chinese Hackers use Quad7 Botnet, LLM Advance, Iran</title><itunes:title>🚨 Sophos Battle with China, Microsoft Warns Chinese Hackers use Quad7 Botnet, LLM Advance, Iran</itunes:title><description><![CDATA[<p>🚨 Sophos Battle with China, Microsoft Warns Chinese Hackers use Quad7 Botnet, LLM Advance, Iran &nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Colorado SOS botches key Election security with more news below:</p><ul><li>FBI Warns of Election Fraud Scheme</li><li>Russian Spear Phishing Attacks</li><li>Ex-Disney Employee Insider Threat&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/</a></p><p><a href="https://www.securityweek.com/fbi-seeking-information-on-chinese-hackers-targeting-sophos-firewalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-seeking-information-on-chinese-hackers-targeting-sophos-firewalls/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/</a></p><p><a href="https://therecord.media/google-llm-sqlite-vulnerability-artificial-intelligence" rel="noopener noreferrer" target="_blank">https://therecord.media/google-llm-sqlite-vulnerability-artificial-intelligence</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-rce-bug-exploited-to-breach-corporate-network/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-rce-bug-exploited-to-breach-corporate-network/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/critical-auth-bugs-smart-factory-cyberattack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/critical-auth-bugs-smart-factory-cyberattack</a></p><p><a href="https://www.securityweek.com/us-israel-describe-iranian-hackers-targeting-of-olympics-surveillance-cameras/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-israel-describe-iranian-hackers-targeting-of-olympics-surveillance-cameras/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lastpass-warns-of-fake-support-centers-trying-to-steal-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lastpass-warns-of-fake-support-centers-trying-to-steal-customer-data/</a></p><p><a href="https://therecord.media/german-police-arrest-two-ddos-for-hire-platform" rel="noopener noreferrer" target="_blank">https://therecord.media/german-police-arrest-two-ddos-for-hire-platform</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Sophos Battle with China, Microsoft Warns Chinese Hackers use Quad7 Botnet, LLM Advance, Iran &nbsp;&nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Colorado SOS botches key Election security with more news below:</p><ul><li>FBI Warns of Election Fraud Scheme</li><li>Russian Spear Phishing Attacks</li><li>Ex-Disney Employee Insider Threat&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/</a></p><p><a href="https://www.securityweek.com/fbi-seeking-information-on-chinese-hackers-targeting-sophos-firewalls/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fbi-seeking-information-on-chinese-hackers-targeting-sophos-firewalls/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/</a></p><p><a href="https://therecord.media/google-llm-sqlite-vulnerability-artificial-intelligence" rel="noopener noreferrer" target="_blank">https://therecord.media/google-llm-sqlite-vulnerability-artificial-intelligence</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-rce-bug-exploited-to-breach-corporate-network/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-rce-bug-exploited-to-breach-corporate-network/</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/critical-auth-bugs-smart-factory-cyberattack" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/critical-auth-bugs-smart-factory-cyberattack</a></p><p><a href="https://www.securityweek.com/us-israel-describe-iranian-hackers-targeting-of-olympics-surveillance-cameras/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/us-israel-describe-iranian-hackers-targeting-of-olympics-surveillance-cameras/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lastpass-warns-of-fake-support-centers-trying-to-steal-customer-data/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lastpass-warns-of-fake-support-centers-trying-to-steal-customer-data/</a></p><p><a href="https://therecord.media/german-police-arrest-two-ddos-for-hire-platform" rel="noopener noreferrer" target="_blank">https://therecord.media/german-police-arrest-two-ddos-for-hire-platform</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">24a7548a-1f20-4ee2-be0d-6582a6eae064</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 04 Nov 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3183bf25-87b5-4711-8817-0e6626746a11/Sophos-Battle-with-China-Microsoft-Warns-Chinese-Hackers-use-Qu.mp3" length="23032658" type="audio/mpeg"/><itunes:duration>15:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>805</itunes:episode><podcast:episode>805</podcast:episode></item><item><title>🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall</title><itunes:title>🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall</itunes:title><description><![CDATA[<p>🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Colorado SOS botches key Election security with more news below:</p><ul><li>FBI Warns of Election Fraud Scheme</li><li>Russian Spear Phishing Attacks</li><li>Ex-Disney Employee Insider Threat</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/colorado-accidentally-put-voting-system-passwords-online-but-officials-say-election-is-secure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/colorado-accidentally-put-voting-system-passwords-online-but-officials-say-election-is-secure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-upcoming-us-general-election-fuel-multiple-fraud-schemes/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-upcoming-us-general-election-fuel-multiple-fraud-schemes/</a></p><p><a href="https://therecord.media/2024-election-systems-foreign-meddling-cisa-update" rel="noopener noreferrer" target="_blank">https://therecord.media/2024-election-systems-foreign-meddling-cisa-update</a></p><p><a href="https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/</a></p><p><a href="https://www.securityweek.com/microsoft-warns-of-russian-spear-phishing-attacks-targeting-over-100-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-warns-of-russian-spear-phishing-attacks-targeting-over-100-organizations/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/ex-disney-employee-charged-hacking-menu-database" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/ex-disney-employee-charged-hacking-menu-database</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/</a></p><p><a href="https://therecord.media/unitedhealth-new-ciso-ransomware-change-healthcare" rel="noopener noreferrer" target="_blank">https://therecord.media/unitedhealth-new-ciso-ransomware-change-healthcare</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Colorado SOS botches key Election security with more news below:</p><ul><li>FBI Warns of Election Fraud Scheme</li><li>Russian Spear Phishing Attacks</li><li>Ex-Disney Employee Insider Threat</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/colorado-accidentally-put-voting-system-passwords-online-but-officials-say-election-is-secure/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/colorado-accidentally-put-voting-system-passwords-online-but-officials-say-election-is-secure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-upcoming-us-general-election-fuel-multiple-fraud-schemes/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-upcoming-us-general-election-fuel-multiple-fraud-schemes/</a></p><p><a href="https://therecord.media/2024-election-systems-foreign-meddling-cisa-update" rel="noopener noreferrer" target="_blank">https://therecord.media/2024-election-systems-foreign-meddling-cisa-update</a></p><p><a href="https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/</a></p><p><a href="https://www.securityweek.com/microsoft-warns-of-russian-spear-phishing-attacks-targeting-over-100-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-warns-of-russian-spear-phishing-attacks-targeting-over-100-organizations/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/ex-disney-employee-charged-hacking-menu-database" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/ex-disney-employee-charged-hacking-menu-database</a></p><p><a href="https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/</a></p><p><a href="https://therecord.media/unitedhealth-new-ciso-ransomware-change-healthcare" rel="noopener noreferrer" target="_blank">https://therecord.media/unitedhealth-new-ciso-ransomware-change-healthcare</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ef568b8b-40a8-4f9c-9d76-8442b8bc877a</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 31 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6519a84f-b0dc-4c52-ad72-8760b08f13b9/Colorado-Butches-Election-Security-FBI-Warning-on-Election-Frau.mp3" length="27297096" type="audio/mpeg"/><itunes:duration>18:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>804</itunes:episode><podcast:episode>804</podcast:episode></item><item><title>🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia &amp; China, China Cloud Hijacking Attacks</title><itunes:title>🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia &amp; China, China Cloud Hijacking Attacks</itunes:title><description><![CDATA[<p>🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia &amp; China, China Cloud Hijacking Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Sinclair sues its cyber insurers for nonpayment with more news below:</p><ul><li>WhiteRabbitNeo Uncensored AI Pentesting</li><li>Chrome Patch</li><li>Lightspy iOS Malware</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/sinclair-sues-cyber-insurers-over-2021-hack-f228bee4?tpl=cs&amp;mod=hp_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/sinclair-sues-cyber-insurers-over-2021-hack-f228bee4?tpl=cs&amp;mod=hp_lead_pos1</a></p><p><a href="https://therecord.media/china-russia-cyberattacks-targeting-netherlands" rel="noopener noreferrer" target="_blank">https://therecord.media/china-russia-cyberattacks-targeting-netherlands</a></p><p><a href="https://www.darkreading.com/cloud-security/china-evasive-panda-apt-cloud-hijacking" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/china-evasive-panda-apt-cloud-hijacking</a></p><p><a href="https://www.securityweek.com/whiterabbitneo-high-powered-potential-of-uncensored-ai-pentesting-for-attackers-and-defenders/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/whiterabbitneo-high-powered-potential-of-uncensored-ai-pentesting-for-attackers-and-defenders/</a></p><p><a href="https://www.securityweek.com/recent-version-of-lightspy-ios-malware-packs-destructive-capabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-version-of-lightspy-ios-malware-packs-destructive-capabilities/</a></p><p><a href="https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/</a></p><p><a href="https://therecord.media/redline-infostealer-malware-criminal-complaint-maxim-rudometov" rel="noopener noreferrer" target="_blank">https://therecord.media/redline-infostealer-malware-criminal-complaint-maxim-rudometov</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/recurring-windows-flaw-could-expose-user-credentials" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/recurring-windows-flaw-could-expose-user-credentials</a></p><p><a href="https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia &amp; China, China Cloud Hijacking Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Sinclair sues its cyber insurers for nonpayment with more news below:</p><ul><li>WhiteRabbitNeo Uncensored AI Pentesting</li><li>Chrome Patch</li><li>Lightspy iOS Malware</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/sinclair-sues-cyber-insurers-over-2021-hack-f228bee4?tpl=cs&amp;mod=hp_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/sinclair-sues-cyber-insurers-over-2021-hack-f228bee4?tpl=cs&amp;mod=hp_lead_pos1</a></p><p><a href="https://therecord.media/china-russia-cyberattacks-targeting-netherlands" rel="noopener noreferrer" target="_blank">https://therecord.media/china-russia-cyberattacks-targeting-netherlands</a></p><p><a href="https://www.darkreading.com/cloud-security/china-evasive-panda-apt-cloud-hijacking" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cloud-security/china-evasive-panda-apt-cloud-hijacking</a></p><p><a href="https://www.securityweek.com/whiterabbitneo-high-powered-potential-of-uncensored-ai-pentesting-for-attackers-and-defenders/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/whiterabbitneo-high-powered-potential-of-uncensored-ai-pentesting-for-attackers-and-defenders/</a></p><p><a href="https://www.securityweek.com/recent-version-of-lightspy-ios-malware-packs-destructive-capabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/recent-version-of-lightspy-ios-malware-packs-destructive-capabilities/</a></p><p><a href="https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/</a></p><p><a href="https://therecord.media/redline-infostealer-malware-criminal-complaint-maxim-rudometov" rel="noopener noreferrer" target="_blank">https://therecord.media/redline-infostealer-malware-criminal-complaint-maxim-rudometov</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/recurring-windows-flaw-could-expose-user-credentials" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/vulnerabilities-threats/recurring-windows-flaw-could-expose-user-credentials</a></p><p><a href="https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">49e2c87e-0de9-42e6-adcd-f6c9a871b730</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 30 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/923af6a0-638d-479e-94df-8506f1db4728/Sinclair-Sues-Cyber-Insurers-Netherlands-Targeted-by-Russia-Chi.mp3" length="28126536" type="audio/mpeg"/><itunes:duration>19:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>803</itunes:episode><podcast:episode>803</podcast:episode></item><item><title>🚨 Apple Patches All Devices, Redline &amp; Meta Infostealers Taken Down, ChatGPT Jailbreak</title><itunes:title>🚨 Apple Patches All Devices, Redline &amp; Meta Infostealers Taken Down, ChatGPT Jailbreak</itunes:title><description><![CDATA[<p>🚨 Apple Patches All Devices, Redline &amp; Meta Infostealers Taken Down, ChatGPT Jailbreak</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Apple patches vulnerabilities across eco-system with more news below:</p><ul><li>Italy Arrests Illegal Dossiers Creators</li><li>Free Confirms Data Breach</li><li>SEC Sends a message to Start ups</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/</a></p><p><a href="https://therecord.media/infostealer-servers-takedown-dutch-police-fbi" rel="noopener noreferrer" target="_blank">https://therecord.media/infostealer-servers-takedown-dutch-police-fbi</a></p><p><a href="https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/</a></p><p><a href="https://therecord.media/italy-arrests-illegal-dossiers-private-intelligence" rel="noopener noreferrer" target="_blank">https://therecord.media/italy-arrests-illegal-dossiers-private-intelligence</a></p><p><a href="https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/</a></p><p><a href="https://thehackernews.com/2024/10/us-government-issues-new-tlp-guidance.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/us-government-issues-new-tlp-guidance.html</a></p><p><a href="https://www.darkreading.com/threat-intelligence/china-cyber-corps-hone-skills-virtual-battlefields" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/china-cyber-corps-hone-skills-virtual-battlefields</a></p><p><a href="https://www.wsj.com/articles/sec-sends-a-message-to-startups-about-fake-it-culture-84af4b29?mod=business_feat12_entrepreneurship_pos5" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/sec-sends-a-message-to-startups-about-fake-it-culture-84af4b29?mod=business_feat12_entrepreneurship_pos5</a></p><p><a href="https://www.securityweek.com/canada-says-chinese-reconnaissance-scans-targeting-government-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canada-says-chinese-reconnaissance-scans-targeting-government-organizations/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Apple Patches All Devices, Redline &amp; Meta Infostealers Taken Down, ChatGPT Jailbreak</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Apple patches vulnerabilities across eco-system with more news below:</p><ul><li>Italy Arrests Illegal Dossiers Creators</li><li>Free Confirms Data Breach</li><li>SEC Sends a message to Start ups</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/</a></p><p><a href="https://therecord.media/infostealer-servers-takedown-dutch-police-fbi" rel="noopener noreferrer" target="_blank">https://therecord.media/infostealer-servers-takedown-dutch-police-fbi</a></p><p><a href="https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/</a></p><p><a href="https://therecord.media/italy-arrests-illegal-dossiers-private-intelligence" rel="noopener noreferrer" target="_blank">https://therecord.media/italy-arrests-illegal-dossiers-private-intelligence</a></p><p><a href="https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/</a></p><p><a href="https://thehackernews.com/2024/10/us-government-issues-new-tlp-guidance.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2024/10/us-government-issues-new-tlp-guidance.html</a></p><p><a href="https://www.darkreading.com/threat-intelligence/china-cyber-corps-hone-skills-virtual-battlefields" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/china-cyber-corps-hone-skills-virtual-battlefields</a></p><p><a href="https://www.wsj.com/articles/sec-sends-a-message-to-startups-about-fake-it-culture-84af4b29?mod=business_feat12_entrepreneurship_pos5" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/sec-sends-a-message-to-startups-about-fake-it-culture-84af4b29?mod=business_feat12_entrepreneurship_pos5</a></p><p><a href="https://www.securityweek.com/canada-says-chinese-reconnaissance-scans-targeting-government-organizations/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/canada-says-chinese-reconnaissance-scans-targeting-government-organizations/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p><strong>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news</strong>.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f29f445f-809f-4240-9fa1-600e8880c80b</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 29 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/94b1f51b-2713-4828-b149-c3a1ab16dab1/Apple-Patches-All-Devices-Redline-Meta-Infostealers-Taken-Down-.mp3" length="27788616" type="audio/mpeg"/><itunes:duration>19:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>802</itunes:episode><podcast:episode>802</podcast:episode></item><item><title>🚨 Chinese Hackers Target Trump &amp; Vance Phones, Change Healthcare Impacts 100M, Delta Sues CrowdStrike</title><itunes:title>🚨 Chinese Hackers Target Trump &amp; Vance Phones, Change Healthcare Impacts 100M, Delta Sues CrowdStrike</itunes:title><description><![CDATA[<p>🚨 Chinese Hackers Target Trump &amp; Vance Phones, Change Healthcare Impacts 100M, Delta Sues CrowdStrike</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Chinese hackers targeted President Trump and Senator JD Vance with more news below:</p><ul><li>Ransomhub behind Mexico Airport Attack &nbsp;</li><li>Landmark discloses Data Breach</li><li>Heptax Cyberattack</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ap-sources-chinese-hackers-targeted-phones-of-trump-vance-people-associated-with-harris-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ap-sources-chinese-hackers-targeted-phones-of-trump-vance-people-associated-with-harris-campaign/</a></p><p><a href="https://www.securityweek.com/change-healthcare-ransomware-attack-impacts-100-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/change-healthcare-ransomware-attack-impacts-100-million-people/</a></p><p><a href="https://www.wsj.com/business/airlines/delta-sues-crowdstrike-over-july-operations-meltdown-099ad8fa?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/airlines/delta-sues-crowdstrike-over-july-operations-meltdown-099ad8fa?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator</a></p><p><a href="https://www.securityweek.com/landmark-admin-discloses-data-breach-impacting-800000-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/landmark-admin-discloses-data-breach-impacting-800000-people/</a></p><p><a href="https://thecyberexpress.com/heptax-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/heptax-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/</a></p><p><a href="https://www.securityweek.com/linkedin-hit-with-310-million-euro-fine-for-data-privacy-violations-from-irish-watchdog/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/linkedin-hit-with-310-million-euro-fine-for-data-privacy-violations-from-irish-watchdog/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Chinese Hackers Target Trump &amp; Vance Phones, Change Healthcare Impacts 100M, Delta Sues CrowdStrike</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Chinese hackers targeted President Trump and Senator JD Vance with more news below:</p><ul><li>Ransomhub behind Mexico Airport Attack &nbsp;</li><li>Landmark discloses Data Breach</li><li>Heptax Cyberattack</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/ap-sources-chinese-hackers-targeted-phones-of-trump-vance-people-associated-with-harris-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ap-sources-chinese-hackers-targeted-phones-of-trump-vance-people-associated-with-harris-campaign/</a></p><p><a href="https://www.securityweek.com/change-healthcare-ransomware-attack-impacts-100-million-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/change-healthcare-ransomware-attack-impacts-100-million-people/</a></p><p><a href="https://www.wsj.com/business/airlines/delta-sues-crowdstrike-over-july-operations-meltdown-099ad8fa?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/airlines/delta-sues-crowdstrike-over-july-operations-meltdown-099ad8fa?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator" rel="noopener noreferrer" target="_blank">https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator</a></p><p><a href="https://www.securityweek.com/landmark-admin-discloses-data-breach-impacting-800000-people/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/landmark-admin-discloses-data-breach-impacting-800000-people/</a></p><p><a href="https://thecyberexpress.com/heptax-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/heptax-cyberattack/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/</a></p><p><a href="https://www.securityweek.com/linkedin-hit-with-310-million-euro-fine-for-data-privacy-violations-from-irish-watchdog/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/linkedin-hit-with-310-million-euro-fine-for-data-privacy-violations-from-irish-watchdog/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>&nbsp;</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>&nbsp;</p><p>=================================</p><p>&nbsp;</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">ae557365-beea-45ce-87ef-7593f88bb809</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 28 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a51ee75c-189b-4087-b905-b2801ce2be9a/Chinese-Hackers-Target-Trump-Vance-Phones-Change-Healthcare-Imp.mp3" length="26311548" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>801</itunes:episode><podcast:episode>801</podcast:episode></item><item><title>🚨 FortiManager Zeroday, Iran Targets Presidential Election, Cisco Brute Force Attack, Penn State Fine</title><itunes:title>🚨 FortiManager Zeroday, Iran Targets Presidential Election, Cisco Brute Force Attack, Penn State Fine</itunes:title><description><![CDATA[<p>🚨 FortiManager Zeroday, Iran Targets Presidential Election, Cisco Brute Force Attack, Penn State Fine &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Fortinet deals with another Zeroday with more news below:</p><ul><li>Cisco Brute Force Attack</li><li>Russia Targets US Critical Infrastructure</li><li>Trick Captcha</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-patches-vulnerability-exploited-in-large-scale-brute-force-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-vulnerability-exploited-in-large-scale-brute-force-campaign/</a></p><p><a href="https://www.securityweek.com/new-fortinet-zero-day-exploited-for-months-before-patch-release/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-fortinet-zero-day-exploited-for-months-before-patch-release/</a></p><p><a href="https://thecyberexpress.com/us-presidential-election-targeted-by-hackers/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-presidential-election-targeted-by-hackers/</a></p><p><a href="https://therecord.media/wisconsin-sued-over-voting-system-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/wisconsin-sued-over-voting-system-cyber</a></p><p><a href="https://thecyberexpress.com/russia-breaching-us-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/russia-breaching-us-critical-infrastructure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/trick-captcha-lumma-stealer-malware" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/trick-captcha-lumma-stealer-malware</a></p><p><a href="https://www.bankinfosecurity.com/embargo-ransomware-disables-security-defenses-a-26603" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/embargo-ransomware-disables-security-defenses-a-26603</a></p><p><a href="https://therecord.media/penn-state-fined-millions-cybersecurity" rel="noopener noreferrer" target="_blank">https://therecord.media/penn-state-fined-millions-cybersecurity</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 FortiManager Zeroday, Iran Targets Presidential Election, Cisco Brute Force Attack, Penn State Fine &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Fortinet deals with another Zeroday with more news below:</p><ul><li>Cisco Brute Force Attack</li><li>Russia Targets US Critical Infrastructure</li><li>Trick Captcha</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-patches-vulnerability-exploited-in-large-scale-brute-force-campaign/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-patches-vulnerability-exploited-in-large-scale-brute-force-campaign/</a></p><p><a href="https://www.securityweek.com/new-fortinet-zero-day-exploited-for-months-before-patch-release/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-fortinet-zero-day-exploited-for-months-before-patch-release/</a></p><p><a href="https://thecyberexpress.com/us-presidential-election-targeted-by-hackers/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/us-presidential-election-targeted-by-hackers/</a></p><p><a href="https://therecord.media/wisconsin-sued-over-voting-system-cyber" rel="noopener noreferrer" target="_blank">https://therecord.media/wisconsin-sued-over-voting-system-cyber</a></p><p><a href="https://thecyberexpress.com/russia-breaching-us-critical-infrastructure/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/russia-breaching-us-critical-infrastructure/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/lazarus-hackers-used-fake-defi-game-to-exploit-google-chrome-zero-day/</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/trick-captcha-lumma-stealer-malware" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/trick-captcha-lumma-stealer-malware</a></p><p><a href="https://www.bankinfosecurity.com/embargo-ransomware-disables-security-defenses-a-26603" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/embargo-ransomware-disables-security-defenses-a-26603</a></p><p><a href="https://therecord.media/penn-state-fined-millions-cybersecurity" rel="noopener noreferrer" target="_blank">https://therecord.media/penn-state-fined-millions-cybersecurity</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">57f4cfb6-2e99-40e1-85e1-feef7f9a7d17</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 24 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4e701e3a-dd1c-4eb9-9396-17c7cc4dd466/FortiManager-Zeroday-Iran-Targets-Presidential-Election-Cisco-B.mp3" length="24703450" type="audio/mpeg"/><itunes:duration>17:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>800</itunes:episode><podcast:episode>800</podcast:episode></item><item><title>🚨 SolarWinds Hack Results in Disclosure Fines, Samsung ZeroDay, Tik Tok Intern Trouble, NotLockBit</title><itunes:title>🚨 SolarWinds Hack Results in Disclosure Fines, Samsung ZeroDay, Tik Tok Intern Trouble, NotLockBit</itunes:title><description><![CDATA[<p>🚨 SolarWinds Hack Results in Disclosure Fines, Samsung ZeroDay, Tik Tok Intern Trouble, NotLockBit</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as SEC Fines 4 different companies for disclosure fines with more news below:</p><p><br></p><ul><li>Byte Dance Intern Kills AI</li><li>SharePoint flaw exploited in the wild</li><li>SANS ICS Report</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/u-s-fines-tech-companies-over-disclosures-related-to-solarwinds-hack-e08fedc8?tpl=cs&amp;mod=hp_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/u-s-fines-tech-companies-over-disclosures-related-to-solarwinds-hack-e08fedc8?tpl=cs&amp;mod=hp_lead_pos1</a></p><p><a href="https://nypost.com/2024/10/21/business/tiktok-owner-fires-intern-who-maliciously-interfered-with-ai-project/" rel="noopener noreferrer" target="_blank">https://nypost.com/2024/10/21/business/tiktok-owner-fires-intern-who-maliciously-interfered-with-ai-project/</a></p><p><a href="https://www.securityweek.com/google-warns-of-samsung-zero-day-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-warns-of-samsung-zero-day-exploited-in-the-wild/</a></p><p><a href="https://www.securityweek.com/cisa-warns-recent-microsoft-sharepoint-rce-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-recent-microsoft-sharepoint-rce-flaw-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/notlockbit-ransomware-can-target-macos-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notlockbit-ransomware-can-target-macos-devices/</a></p><p><a href="https://www.bankinfosecurity.com/ics-detection-improves-response-still-lacking-a-26584" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ics-detection-improves-response-still-lacking-a-26584</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/russia-linked-hackers-attack-japan-govt-ports" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/russia-linked-hackers-attack-japan-govt-ports</a></p><p><a href="https://therecord.media/cyber-command-2-0-project-progress-military-congress" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-2-0-project-progress-military-congress</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 SolarWinds Hack Results in Disclosure Fines, Samsung ZeroDay, Tik Tok Intern Trouble, NotLockBit</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as SEC Fines 4 different companies for disclosure fines with more news below:</p><p><br></p><ul><li>Byte Dance Intern Kills AI</li><li>SharePoint flaw exploited in the wild</li><li>SANS ICS Report</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.wsj.com/articles/u-s-fines-tech-companies-over-disclosures-related-to-solarwinds-hack-e08fedc8?tpl=cs&amp;mod=hp_lead_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/u-s-fines-tech-companies-over-disclosures-related-to-solarwinds-hack-e08fedc8?tpl=cs&amp;mod=hp_lead_pos1</a></p><p><a href="https://nypost.com/2024/10/21/business/tiktok-owner-fires-intern-who-maliciously-interfered-with-ai-project/" rel="noopener noreferrer" target="_blank">https://nypost.com/2024/10/21/business/tiktok-owner-fires-intern-who-maliciously-interfered-with-ai-project/</a></p><p><a href="https://www.securityweek.com/google-warns-of-samsung-zero-day-exploited-in-the-wild/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-warns-of-samsung-zero-day-exploited-in-the-wild/</a></p><p><a href="https://www.securityweek.com/cisa-warns-recent-microsoft-sharepoint-rce-flaw-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisa-warns-recent-microsoft-sharepoint-rce-flaw-exploited-in-attacks/</a></p><p><a href="https://www.securityweek.com/notlockbit-ransomware-can-target-macos-devices/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/notlockbit-ransomware-can-target-macos-devices/</a></p><p><a href="https://www.bankinfosecurity.com/ics-detection-improves-response-still-lacking-a-26584" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/ics-detection-improves-response-still-lacking-a-26584</a></p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/russia-linked-hackers-attack-japan-govt-ports" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cyberattacks-data-breaches/russia-linked-hackers-attack-japan-govt-ports</a></p><p><a href="https://therecord.media/cyber-command-2-0-project-progress-military-congress" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-command-2-0-project-progress-military-congress</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p><br></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p><br></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">946ebe66-89aa-4c6d-93eb-958c4a19cefb</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 23 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9182ac7b-9b1d-47af-b73a-42228cfa65e7/SolarWinds-Hack-Results-in-Disclosure-Fines-Samsung-ZeroDay-Tik.mp3" length="26112808" type="audio/mpeg"/><itunes:duration>18:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>799</itunes:episode><podcast:episode>799</podcast:episode></item><item><title>🚨 Johnson &amp; Johnson Data Breach, Blackcat &amp; Bumblebee Are Back, VMware struggles to Patch</title><itunes:title>🚨 Johnson &amp; Johnson Data Breach, Blackcat &amp; Bumblebee Are Back, VMware struggles to Patch</itunes:title><description><![CDATA[<p>🚨 Johnson &amp; Johnson Data Breach, Blackcat &amp; Bumblebee Are Back, VMware struggles to Patch</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Johnson and Johnson Report a data breach with more news below:</p><ul><li>Ransomware Group Blackcat is back</li><li>Sophos Acquires SecureWorks</li><li>Tech CEO charged with Fraud</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/pharma-giant-johnson-johnson-discloses-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pharma-giant-johnson-johnson-discloses-data-breach/</a></p><p><a href="https://therecord.media/crypto-payment-services-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/crypto-payment-services-data-breach</a></p><p><a href="https://www.securityweek.com/blackcat-ransomware-successor-cicada3301-emerges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/blackcat-ransomware-successor-cicada3301-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/</a></p><p><a href="https://www.bankinfosecurity.com/sophos-fortifies-xdr-muscle-859m-secureworks-purchase-a-26568" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/sophos-fortifies-xdr-muscle-859m-secureworks-purchase-a-26568</a></p><p><a href="https://www.securityweek.com/vmware-struggles-to-fix-flaw-exploited-at-chinese-hacking-contest/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-struggles-to-fix-flaw-exploited-at-chinese-hacking-contest/</a></p><p><a href="https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine" rel="noopener noreferrer" target="_blank">https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine</a></p><p><a href="https://www.cybersecuritydive.com/news/fbi-cisa-software-security/730174/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fbi-cisa-software-security/730174/</a></p><p><a href="https://www.wsj.com/articles/tech-ceo-charged-with-fraud-over-security-reliability-claims-2e77e8a7?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/tech-ceo-charged-with-fraud-over-security-reliability-claims-2e77e8a7?mod=cybersecurity_news_article_pos1</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Johnson &amp; Johnson Data Breach, Blackcat &amp; Bumblebee Are Back, VMware struggles to Patch</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Johnson and Johnson Report a data breach with more news below:</p><ul><li>Ransomware Group Blackcat is back</li><li>Sophos Acquires SecureWorks</li><li>Tech CEO charged with Fraud</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/pharma-giant-johnson-johnson-discloses-data-breach/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/pharma-giant-johnson-johnson-discloses-data-breach/</a></p><p><a href="https://therecord.media/crypto-payment-services-data-breach" rel="noopener noreferrer" target="_blank">https://therecord.media/crypto-payment-services-data-breach</a></p><p><a href="https://www.securityweek.com/blackcat-ransomware-successor-cicada3301-emerges/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/blackcat-ransomware-successor-cicada3301-emerges/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/</a></p><p><a href="https://www.bankinfosecurity.com/sophos-fortifies-xdr-muscle-859m-secureworks-purchase-a-26568" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/sophos-fortifies-xdr-muscle-859m-secureworks-purchase-a-26568</a></p><p><a href="https://www.securityweek.com/vmware-struggles-to-fix-flaw-exploited-at-chinese-hacking-contest/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-struggles-to-fix-flaw-exploited-at-chinese-hacking-contest/</a></p><p><a href="https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine" rel="noopener noreferrer" target="_blank">https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine</a></p><p><a href="https://www.cybersecuritydive.com/news/fbi-cisa-software-security/730174/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/fbi-cisa-software-security/730174/</a></p><p><a href="https://www.wsj.com/articles/tech-ceo-charged-with-fraud-over-security-reliability-claims-2e77e8a7?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/tech-ceo-charged-with-fraud-over-security-reliability-claims-2e77e8a7?mod=cybersecurity_news_article_pos1</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 China’s Salt Typhoon Targets US ISPs with Massive Cyber attack&nbsp;&nbsp;</p><p><a href="https://youtu.be/Q9Hp5beyF18" rel="noopener noreferrer" target="_blank">https://youtu.be/Q9Hp5beyF18</a></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 James’s hotlist of the most promising 2024 Cybersecurity startups</p><p><a href="https://youtube.com/live/JnAdR6FeKPg?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/live/JnAdR6FeKPg?feature=share</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">9cd78794-825b-40a0-9e83-1c930e14f0b6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 22 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/59999649-ec21-498c-a3f9-3d5b1590b30a/Johnson-Johnson-Data-Breach-Blackcat-Bumblebee-Are-Back-VMware-.mp3" length="26321579" type="audio/mpeg"/><itunes:duration>18:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>798</itunes:episode><podcast:episode>798</podcast:episode></item><item><title>🚨 Cisco Confirms Data Breach, Internet Archive Hacked Again, Microsoft Losses Log Data, Wiper Attacks</title><itunes:title>🚨 Cisco Confirms Data Breach, Internet Archive Hacked Again, Microsoft Losses Log Data, Wiper Attacks</itunes:title><description><![CDATA[<p>🚨 Cisco Confirms Data Breach, Internet Archive Hacked Again, Microsoft Losses Log Data, Wiper Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Cisco now confirms data breach with more news below:</p><p><br></p><ul><li>Roundcube Webmail Vulnerability</li><li>Veeam used in Ransomware attacks</li><li>Nidec Data Breach</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-confirms-security-incident-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-confirms-security-incident-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/</a></p><p><a href="https://www.securityweek.com/new-internet-archive-hack-conducted-during-service-restoration-efforts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-internet-archive-hack-conducted-during-service-restoration-efforts/</a></p><p><a href="https://therecord.media/veam-vulnerability-exploited-ransomware-cisa-kev" rel="noopener noreferrer" target="_blank">https://therecord.media/veam-vulnerability-exploited-ransomware-cisa-kev</a></p><p><a href="https://www.securityweek.com/roundcube-webmail-vulnerability-exploited-in-government-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/roundcube-webmail-vulnerability-exploited-in-government-attack/</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-loss-security-log-data/730285/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-loss-security-log-data/730285/</a></p><p><a href="https://www.securityweek.com/atlassian-patches-vulnerabilities-in-bitbucket-confluence-jira/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/atlassian-patches-vulnerabilities-in-bitbucket-confluence-jira/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/</a></p><p><a href="https://therecord.media/china-spamouflage-operation-testing-techniques-marco-rubio" rel="noopener noreferrer" target="_blank">https://therecord.media/china-spamouflage-operation-testing-techniques-marco-rubio</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-arrest-alabama-man-suspected-of-hacking-secs-x-account/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-arrest-alabama-man-suspected-of-hacking-secs-x-account/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p><br></p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Cisco Confirms Data Breach, Internet Archive Hacked Again, Microsoft Losses Log Data, Wiper Attacks</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Cisco now confirms data breach with more news below:</p><p><br></p><ul><li>Roundcube Webmail Vulnerability</li><li>Veeam used in Ransomware attacks</li><li>Nidec Data Breach</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/cisco-confirms-security-incident-after-hacker-offers-to-sell-data/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cisco-confirms-security-incident-after-hacker-offers-to-sell-data/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/</a></p><p><a href="https://www.securityweek.com/new-internet-archive-hack-conducted-during-service-restoration-efforts/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/new-internet-archive-hack-conducted-during-service-restoration-efforts/</a></p><p><a href="https://therecord.media/veam-vulnerability-exploited-ransomware-cisa-kev" rel="noopener noreferrer" target="_blank">https://therecord.media/veam-vulnerability-exploited-ransomware-cisa-kev</a></p><p><a href="https://www.securityweek.com/roundcube-webmail-vulnerability-exploited-in-government-attack/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/roundcube-webmail-vulnerability-exploited-in-government-attack/</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-loss-security-log-data/730285/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-loss-security-log-data/730285/</a></p><p><a href="https://www.securityweek.com/atlassian-patches-vulnerabilities-in-bitbucket-confluence-jira/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/atlassian-patches-vulnerabilities-in-bitbucket-confluence-jira/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/</a></p><p><a href="https://therecord.media/china-spamouflage-operation-testing-techniques-marco-rubio" rel="noopener noreferrer" target="_blank">https://therecord.media/china-spamouflage-operation-testing-techniques-marco-rubio</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-arrest-alabama-man-suspected-of-hacking-secs-x-account/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/fbi-arrest-alabama-man-suspected-of-hacking-secs-x-account/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p><br></p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">deaf72bf-d426-48ea-9183-4188c3fd397e</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 21 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5e0cf0f5-fbe3-4609-9580-5d09c0e5695d/Cisco-Confirms-Data-Breach-Internet-Archive-Hacked-Again-Micros.mp3" length="26503391" type="audio/mpeg"/><itunes:duration>18:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>797</itunes:episode><podcast:episode>797</podcast:episode></item><item><title>From the Israeli Air Force to CISO Stardom: Esther Pintos on Building Security Culture at Startups</title><itunes:title>From the Israeli Air Force to CISO Stardom: Esther Pintos on Building Security Culture at Startups</itunes:title><description><![CDATA[<h4>Podcast Summary</h4><p>In this engaging episode of the CyberHub Podcast, James Azar welcomes Esther Pintos, the Chief Information Security Officer (CISO) of Anecdotes, for an insightful discussion about her journey from the Israeli Air Force to cybersecurity, and the unique challenges of being a CISO at a startup. James and Esther reflect on their shared experience at the Panorays CISO-Founder All-Star Game, a fun precursor to their in-depth conversation about cyber leadership.</p><p>Be sure to follow <a href="https://www.linkedin.com/in/esther-pinto-/" rel="noopener noreferrer" target="_blank">Esther on LinkedIn</a> for more thought leadership, and check out the podcast for additional CISO interviews!</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<h4>Podcast Summary</h4><p>In this engaging episode of the CyberHub Podcast, James Azar welcomes Esther Pintos, the Chief Information Security Officer (CISO) of Anecdotes, for an insightful discussion about her journey from the Israeli Air Force to cybersecurity, and the unique challenges of being a CISO at a startup. James and Esther reflect on their shared experience at the Panorays CISO-Founder All-Star Game, a fun precursor to their in-depth conversation about cyber leadership.</p><p>Be sure to follow <a href="https://www.linkedin.com/in/esther-pinto-/" rel="noopener noreferrer" target="_blank">Esther on LinkedIn</a> for more thought leadership, and check out the podcast for additional CISO interviews!</p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">6e75077b-4c05-4e58-b3fb-bc4bd81647b8</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Fri, 18 Oct 2024 11:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d8638a15-755a-45eb-a1be-7202dc90668b/CHP-Esther-Pinto-01.mp3" length="56487365" type="audio/mpeg"/><itunes:duration>39:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>796</itunes:episode><podcast:episode>796</podcast:episode></item><item><title>🚨 Anonymous Sudan Charged, Hacker USDoD Arrested, Ransomware Attacks Tripled, Nvidia GenAI Flaw</title><itunes:title>🚨 Anonymous Sudan Charged, Hacker USDoD Arrested, Ransomware Attacks Tripled, Nvidia GenAI Flaw</itunes:title><description><![CDATA[<p>🚨 Anonymous Sudan Charged, Hacker USDoD Arrested, Ransomware Attacks Tripled, Nvidia GenAI Flaw</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as authorities apprehend criminals behind Anonymous Sudan with more news below:</p><ul><li>Ransomware Attacks Tripled</li><li>NeMo GenAI Nvidia Flaw</li><li>Iran serves as broker in access</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/anonymous-sudan-ddos-service-disrupted-members-charged-by-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/anonymous-sudan-ddos-service-disrupted-members-charged-by-us/</a></p><p><a href="https://www.securityweek.com/brazilian-police-arrest-notorious-hacker-usdod/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/brazilian-police-arrest-notorious-hacker-usdod/</a></p><p><a href="https://therecord.media/north-korean-fake-it-workers-extorting-employers" rel="noopener noreferrer" target="_blank">https://therecord.media/north-korean-fake-it-workers-extorting-employers</a></p><p><a href="https://www.securityweek.com/code-execution-data-tampering-flaw-in-nvidia-nemo-gen-ai-framework/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-data-tampering-flaw-in-nvidia-nemo-gen-ai-framework/</a></p><p><a href="https://www.securityweek.com/vmware-patches-high-severity-sql-injection-flaw-in-hcx-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-high-severity-sql-injection-flaw-in-hcx-platform/</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-customers-ransomware-attacks-triple/730011/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-customers-ransomware-attacks-triple/730011/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/iranian-hackers-act-as-brokers-selling-critical-infrastructure-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iranian-hackers-act-as-brokers-selling-critical-infrastructure-access/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-vulnerabilities-in-power-platform-imagine-cup-site/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-vulnerabilities-in-power-platform-imagine-cup-site/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-70-percent-of-exploited-flaws-disclosed-in-2023-were-zero-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-70-percent-of-exploited-flaws-disclosed-in-2023-were-zero-days/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Anonymous Sudan Charged, Hacker USDoD Arrested, Ransomware Attacks Tripled, Nvidia GenAI Flaw</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as authorities apprehend criminals behind Anonymous Sudan with more news below:</p><ul><li>Ransomware Attacks Tripled</li><li>NeMo GenAI Nvidia Flaw</li><li>Iran serves as broker in access</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/anonymous-sudan-ddos-service-disrupted-members-charged-by-us/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/anonymous-sudan-ddos-service-disrupted-members-charged-by-us/</a></p><p><a href="https://www.securityweek.com/brazilian-police-arrest-notorious-hacker-usdod/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/brazilian-police-arrest-notorious-hacker-usdod/</a></p><p><a href="https://therecord.media/north-korean-fake-it-workers-extorting-employers" rel="noopener noreferrer" target="_blank">https://therecord.media/north-korean-fake-it-workers-extorting-employers</a></p><p><a href="https://www.securityweek.com/code-execution-data-tampering-flaw-in-nvidia-nemo-gen-ai-framework/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/code-execution-data-tampering-flaw-in-nvidia-nemo-gen-ai-framework/</a></p><p><a href="https://www.securityweek.com/vmware-patches-high-severity-sql-injection-flaw-in-hcx-platform/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/vmware-patches-high-severity-sql-injection-flaw-in-hcx-platform/</a></p><p><a href="https://www.cybersecuritydive.com/news/microsoft-customers-ransomware-attacks-triple/730011/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/microsoft-customers-ransomware-attacks-triple/730011/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/iranian-hackers-act-as-brokers-selling-critical-infrastructure-access/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iranian-hackers-act-as-brokers-selling-critical-infrastructure-access/</a></p><p><a href="https://www.securityweek.com/microsoft-patches-vulnerabilities-in-power-platform-imagine-cup-site/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/microsoft-patches-vulnerabilities-in-power-platform-imagine-cup-site/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-70-percent-of-exploited-flaws-disclosed-in-2023-were-zero-days/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-70-percent-of-exploited-flaws-disclosed-in-2023-were-zero-days/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">51ac0428-9a0c-4658-b8dc-fd967ef9f073</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 17 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/417a83a7-868b-442d-ad80-4d916e42afd4/Anonymous-Sudan-Charged-Hacker-USDoD-Arrested-Ransomware-Attack.mp3" length="23017611" type="audio/mpeg"/><itunes:duration>15:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>795</itunes:episode><podcast:episode>795</podcast:episode></item><item><title>🚨 Cisco Investigates Breach, Chinese Researchers Break RSA Encryption, SolarWinds Helpdesk Exploit, Passkeys</title><itunes:title>🚨 Cisco Investigates Breach, Chinese Researchers Break RSA Encryption, SolarWinds Helpdesk Exploit, Passkeys</itunes:title><description><![CDATA[<p>🚨 Cisco Investigates Breach, Chinese Researchers Break RSA Encryption, SolarWinds Helpdesk Exploit, Passkeys &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Cisco investigates data breach with more news below:</p><p><br></p><ul><li>Oracle Patches Released</li><li>GitHub Vulnerability</li><li>Sipulittie Marketplace Takedown</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-patches-over-200-vulnerabilities-with-october-2024-cpu/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-over-200-vulnerabilities-with-october-2024-cpu/</a></p><p><a href="https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/</a></p><p><a href="https://www.securityweek.com/organizations-warned-of-exploited-solarwinds-web-help-desk-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-warned-of-exploited-solarwinds-web-help-desk-vulnerability/</a></p><p><a href="https://www.securityweek.com/google-pays-out-36000-for-severe-chrome-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-pays-out-36000-for-severe-chrome-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/</a></p><p><a href="https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/amazon-says-175-million-customer-now-use-passkeys-to-log-in/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-says-175-million-customer-now-use-passkeys-to-log-in/</a></p><p><a href="https://therecord.media/sweden-filand-take-down-sipulitie-criminal-marketplace" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-filand-take-down-sipulitie-criminal-marketplace</a></p><p><a href="https://therecord.media/uk-nationally-significant-cyberattacks-ncsc-horne-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nationally-significant-cyberattacks-ncsc-horne-warning</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p><br></p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Cisco Investigates Breach, Chinese Researchers Break RSA Encryption, SolarWinds Helpdesk Exploit, Passkeys &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p><br></p><p>Today’s episode will discuss the latest news as Cisco investigates data breach with more news below:</p><p><br></p><ul><li>Oracle Patches Released</li><li>GitHub Vulnerability</li><li>Sipulittie Marketplace Takedown</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/oracle-patches-over-200-vulnerabilities-with-october-2024-cpu/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/oracle-patches-over-200-vulnerabilities-with-october-2024-cpu/</a></p><p><a href="https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/</a></p><p><a href="https://www.securityweek.com/organizations-warned-of-exploited-solarwinds-web-help-desk-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/organizations-warned-of-exploited-solarwinds-web-help-desk-vulnerability/</a></p><p><a href="https://www.securityweek.com/google-pays-out-36000-for-severe-chrome-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/google-pays-out-36000-for-severe-chrome-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/</a></p><p><a href="https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/amazon-says-175-million-customer-now-use-passkeys-to-log-in/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/amazon-says-175-million-customer-now-use-passkeys-to-log-in/</a></p><p><a href="https://therecord.media/sweden-filand-take-down-sipulitie-criminal-marketplace" rel="noopener noreferrer" target="_blank">https://therecord.media/sweden-filand-take-down-sipulitie-criminal-marketplace</a></p><p><a href="https://therecord.media/uk-nationally-significant-cyberattacks-ncsc-horne-warning" rel="noopener noreferrer" target="_blank">https://therecord.media/uk-nationally-significant-cyberattacks-ncsc-horne-warning</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p><br></p><p>=============================</p><p><br></p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p><br></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>&nbsp;</p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p><br></p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p><br></p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p><br></p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p><br></p><p>&nbsp;=============================</p><p><br></p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><br><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><br><p>=================================</p><br><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><br><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><br><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><br><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">f9d9385d-b14f-4a24-8124-a6bcc54fca56</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Wed, 16 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e05ffe6a-c3b9-4099-9b4f-efb856eb2882/Cisco-Investigates-Breach-Chinese-Researchers-Break-RSA-Encrypt.mp3" length="23534836" type="audio/mpeg"/><itunes:duration>16:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>794</itunes:episode><podcast:episode>794</podcast:episode></item><item><title>🚨 National Public Data Files Chapter 11, Critical Fortinet Flaws, China Steps up Aggression, CMMC 2.0</title><itunes:title>🚨 National Public Data Files Chapter 11, Critical Fortinet Flaws, China Steps up Aggression, CMMC 2.0</itunes:title><description><![CDATA[<p>🚨 National Public Data Files Chapter 11, Critical Fortinet Flaws, China Steps up Aggression, CMMC 2.0 &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as National Public Data Files for Chapter 11 following data breach with more news below:</p><ul><li>Fortinet Flaws Under Attack</li><li>DoD CMMC 2.0 &nbsp;</li><li>AI &amp; Nuclear Power</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/national-public-data-bankruptcy-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/national-public-data-bankruptcy-cyberattack</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-cve-fortinet-exploited/729736/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-cve-fortinet-exploited/729736/</a></p><p><a href="https://www.securityweek.com/ivanti-csa-zero-day-exploitation-attributed-to-state-sponsored-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-csa-zero-day-exploitation-attributed-to-state-sponsored-hackers/</a></p><p><a href="https://www.infosecurity-magazine.com/news/dod-cybersecurity-standards/" rel="noopener noreferrer" target="_blank">https://www.infosecurity-magazine.com/news/dod-cybersecurity-standards/</a></p><p><a href="https://www.securityweek.com/gryphon-healthcare-tri-city-medical-center-disclose-significant-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gryphon-healthcare-tri-city-medical-center-disclose-significant-data-breaches/</a></p><p><a href="https://www.wsj.com/business/energy-oil/google-nuclear-power-artificial-intelligence-87966624?mod=hp_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/energy-oil/google-nuclear-power-artificial-intelligence-87966624?mod=hp_lead_pos2</a></p><p><a href="https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users" rel="noopener noreferrer" target="_blank">https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users</a></p><p><a href="https://www.bleepingcomputer.com/news/security/jetpack-fixes-critical-information-disclosure-flaw-existing-since-2016/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jetpack-fixes-critical-information-disclosure-flaw-existing-since-2016/</a></p><p><a href="https://www.cybersecuritydive.com/news/funding-slides-q3/729550/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/funding-slides-q3/729550/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 National Public Data Files Chapter 11, Critical Fortinet Flaws, China Steps up Aggression, CMMC 2.0 &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as National Public Data Files for Chapter 11 following data breach with more news below:</p><ul><li>Fortinet Flaws Under Attack</li><li>DoD CMMC 2.0 &nbsp;</li><li>AI &amp; Nuclear Power</li></ul><br/><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://therecord.media/national-public-data-bankruptcy-cyberattack" rel="noopener noreferrer" target="_blank">https://therecord.media/national-public-data-bankruptcy-cyberattack</a></p><p><a href="https://www.cybersecuritydive.com/news/critical-cve-fortinet-exploited/729736/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/critical-cve-fortinet-exploited/729736/</a></p><p><a href="https://www.securityweek.com/ivanti-csa-zero-day-exploitation-attributed-to-state-sponsored-hackers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ivanti-csa-zero-day-exploitation-attributed-to-state-sponsored-hackers/</a></p><p><a href="https://www.infosecurity-magazine.com/news/dod-cybersecurity-standards/" rel="noopener noreferrer" target="_blank">https://www.infosecurity-magazine.com/news/dod-cybersecurity-standards/</a></p><p><a href="https://www.securityweek.com/gryphon-healthcare-tri-city-medical-center-disclose-significant-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/gryphon-healthcare-tri-city-medical-center-disclose-significant-data-breaches/</a></p><p><a href="https://www.wsj.com/business/energy-oil/google-nuclear-power-artificial-intelligence-87966624?mod=hp_lead_pos2" rel="noopener noreferrer" target="_blank">https://www.wsj.com/business/energy-oil/google-nuclear-power-artificial-intelligence-87966624?mod=hp_lead_pos2</a></p><p><a href="https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users" rel="noopener noreferrer" target="_blank">https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users</a></p><p><a href="https://www.bleepingcomputer.com/news/security/jetpack-fixes-critical-information-disclosure-flaw-existing-since-2016/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/jetpack-fixes-critical-information-disclosure-flaw-existing-since-2016/</a></p><p><a href="https://www.cybersecuritydive.com/news/funding-slides-q3/729550/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/funding-slides-q3/729550/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">5d393ce0-91a3-45a4-a874-a72acfca85c6</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Tue, 15 Oct 2024 09:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3610545d-22bb-42c3-a4e5-562021a14589/National-Public-Data-Files-Chapter-11-Critical-Fortinet-Flaws-C.mp3" length="28309602" type="audio/mpeg"/><itunes:duration>19:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>793</itunes:episode><podcast:episode>793</podcast:episode></item><item><title>🚨 Iran Exploit Windows Flaw &amp; OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar</title><itunes:title>🚨 Iran Exploit Windows Flaw &amp; OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar</itunes:title><description><![CDATA[<p>🚨 Iran Exploit Windows Flaw &amp; OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Iran’s cyber activates with more news below:</p><ul><li>F5 Big-IP Abuse</li><li>Fidelity Investment Data Breach</li><li>Veeam RCE Flaw Exploit&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/openai-says-iranian-hackers-used-chatgpt-to-plan-ics-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-says-iranian-hackers-used-chatgpt-to-plan-ics-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/</a></p><p><a href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/</a></p><p><a href="https://therecord.media/cyber-insurer-says-ransomware-attacks-drove-higher-claims" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-insurer-says-ransomware-attacks-drove-higher-claims</a></p><p><a href="https://www.securityweek.com/fidelity-investments-data-breach-impacts-77000-customers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fidelity-investments-data-breach-impacts-77000-customers/</a></p><p><a href="https://thecyberexpress.com/game-freak-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/game-freak-cyberattack/</a></p><p><a href="https://www.cybersecuritydive.com/news/american-water-reconnecting-cyberattack/729565/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/american-water-reconnecting-cyberattack/729565/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/</a></p><p><a href="https://www.securityweek.com/juniper-networks-patches-dozens-of-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-networks-patches-dozens-of-vulnerabilities/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Iran Exploit Windows Flaw &amp; OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Iran’s cyber activates with more news below:</p><ul><li>F5 Big-IP Abuse</li><li>Fidelity Investment Data Breach</li><li>Veeam RCE Flaw Exploit&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.securityweek.com/openai-says-iranian-hackers-used-chatgpt-to-plan-ics-attacks/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/openai-says-iranian-hackers-used-chatgpt-to-plan-ics-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/</a></p><p><a href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951?mod=cybersecurity_news_article_pos1" rel="noopener noreferrer" target="_blank">https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951?mod=cybersecurity_news_article_pos1</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/</a></p><p><a href="https://therecord.media/cyber-insurer-says-ransomware-attacks-drove-higher-claims" rel="noopener noreferrer" target="_blank">https://therecord.media/cyber-insurer-says-ransomware-attacks-drove-higher-claims</a></p><p><a href="https://www.securityweek.com/fidelity-investments-data-breach-impacts-77000-customers/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/fidelity-investments-data-breach-impacts-77000-customers/</a></p><p><a href="https://thecyberexpress.com/game-freak-cyberattack/" rel="noopener noreferrer" target="_blank">https://thecyberexpress.com/game-freak-cyberattack/</a></p><p><a href="https://www.cybersecuritydive.com/news/american-water-reconnecting-cyberattack/729565/" rel="noopener noreferrer" target="_blank">https://www.cybersecuritydive.com/news/american-water-reconnecting-cyberattack/729565/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/</a></p><p><a href="https://www.securityweek.com/juniper-networks-patches-dozens-of-vulnerabilities/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/juniper-networks-patches-dozens-of-vulnerabilities/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p><br></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p><br></p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><br><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">c97eaead-4d8f-4b49-b24e-55e77efaf562</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Mon, 14 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/68791e94-f9e9-4b71-8882-3d9785a2cbac/Iran-Exploit-Windows-Flaw-OpenAI-China-s-Salt-Typhoon-Attack-Fe.mp3" length="23855829" type="audio/mpeg"/><itunes:duration>16:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>792</itunes:episode><podcast:episode>792</podcast:episode></item><item><title>🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise</title><itunes:title>🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise</itunes:title><description><![CDATA[<p>🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Internet archive data breach with more news below:</p><ul><li>Fortinet Exploit in the Wild</li><li>AI Powered Cybercrime on the rise</li><li>Discord Blocked in Turkey &amp; Russia&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/</a></p><p><a href="https://www.securityweek.com/marriott-agrees-to-pay-52-million-beef-up-data-security-to-resolve-probes-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/marriott-agrees-to-pay-52-million-beef-up-data-security-to-resolve-probes-over-data-breaches/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/australia-intros-first-national-cyber-legislation" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/australia-intros-first-national-cyber-legislation</a></p><p><a href="https://therecord.media/russia-ukraine-espionage-luber-nsa" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-ukraine-espionage-luber-nsa</a></p><p><a href="https://www.darkreading.com/threat-intelligence/ai-powered-cybercrime-cartels-asia" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/ai-powered-cybercrime-cartels-asia</a></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/</a></p><p><a href="https://www.securityweek.com/firefox-131-update-patches-exploited-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/firefox-131-update-patches-exploited-zero-day-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/government/discord-blocked-in-russia-and-turkey-for-spreading-illegal-content/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/government/discord-blocked-in-russia-and-turkey-for-spreading-illegal-content/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p class="ql-align-justify"><br></p><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></description><content:encoded><![CDATA[<p>🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise &nbsp;</p><p>🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners</p><p>Today’s episode will discuss the latest news as Internet archive data breach with more news below:</p><ul><li>Fortinet Exploit in the Wild</li><li>AI Powered Cybercrime on the rise</li><li>Discord Blocked in Turkey &amp; Russia&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li></ul><br/><p>For more information, please visit our website:&nbsp;<a href="https://www.cyberhubpodcast.com/" rel="noopener noreferrer" target="_blank">https://www.cyberhubpodcast.com/</a>&nbsp;</p><p><br></p><p><strong>✅ Story Links:&nbsp;</strong></p><p><a href="https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/</a></p><p><a href="https://www.securityweek.com/marriott-agrees-to-pay-52-million-beef-up-data-security-to-resolve-probes-over-data-breaches/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/marriott-agrees-to-pay-52-million-beef-up-data-security-to-resolve-probes-over-data-breaches/</a></p><p><a href="https://www.darkreading.com/cybersecurity-operations/australia-intros-first-national-cyber-legislation" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/cybersecurity-operations/australia-intros-first-national-cyber-legislation</a></p><p><a href="https://therecord.media/russia-ukraine-espionage-luber-nsa" rel="noopener noreferrer" target="_blank">https://therecord.media/russia-ukraine-espionage-luber-nsa</a></p><p><a href="https://www.darkreading.com/threat-intelligence/ai-powered-cybercrime-cartels-asia" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/threat-intelligence/ai-powered-cybercrime-cartels-asia</a></p><p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/</a></p><p><a href="https://www.securityweek.com/firefox-131-update-patches-exploited-zero-day-vulnerability/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/firefox-131-update-patches-exploited-zero-day-vulnerability/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/</a></p><p><a href="https://www.bleepingcomputer.com/news/government/discord-blocked-in-russia-and-turkey-for-spreading-illegal-content/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/government/discord-blocked-in-russia-and-turkey-for-spreading-illegal-content/</a></p><p><br></p><p>🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. <a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a> &nbsp;</p><p><br></p><p><strong>✅ Important Links to Follow:&nbsp;</strong></p><p>👉Substack:<a href="http://jamesazar.substack.com" rel="noopener noreferrer" target="_blank"> http://jamesazar.substack.com</a></p><p>👉Listen here: <a href="https://linktr.ee/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://linktr.ee/cyberhubpodcast</a>&nbsp;&nbsp;&nbsp;</p><p><br></p><p>✅ <strong>Stay Connected With Us.</strong></p><p>👉Facebook: <a href="https://www.facebook.com/CyberHubpodcast/" rel="noopener noreferrer" target="_blank">https://www.facebook.com/CyberHubpodcast/</a>&nbsp;</p><p>👉LinkedIn: <a href="https://www.linkedin.com/company/cyberhubpodcast/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cyberhubpodcast/</a>&nbsp;</p><p>👉Twitter (X): <a href="https://twitter.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://twitter.com/cyberhubpodcast</a>&nbsp;</p><p>👉Instagram: <a href="https://www.instagram.com/cyberhubpodcast" rel="noopener noreferrer" target="_blank">https://www.instagram.com/cyberhubpodcast</a>&nbsp;</p><p><br></p><p><strong>✅ For Business Inquiries:</strong>&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a></p><p>=============================</p><p>✅ <strong>Other Videos You Might Be Interested in Watching:&nbsp;</strong></p><p>👉 The Unstoppable Rise of AI and the Never Ending Hype&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/DNPrsK8GNgM?feature=share" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/DNPrsK8GNgM?feature=share</a></p><p>👉 A Deep Dive into the MGM Resorts Ransomware - An Inside look into the current FACTS&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=Xth4WIk1kYc" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=Xth4WIk1kYc</a>&nbsp;</p><p>👉 The Latest on the MGM Resorts Ransomware Attack &amp; its impact on Vegas and Cybersecurity overall&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=T7IyvVSj8FY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=T7IyvVSj8FY</a>&nbsp;</p><p>👉 What Does Omer Adam &amp; Tel Aviv have to do with Cybersecurity? Find out on CISO Talk&nbsp;&nbsp;</p><p><a href="https://www.youtube.com/watch?v=xBJDDN8djU0" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=xBJDDN8djU0</a>&nbsp;</p><p>👉 Unveiling the Biggest Misconception in SaaS Security&nbsp;&nbsp;</p><p><a href="https://youtube.com/shorts/lv-v9FeNamU" rel="noopener noreferrer" target="_blank">https://youtube.com/shorts/lv-v9FeNamU</a></p><p>&nbsp;=============================</p><p>✅ <strong>About The CyberHub Podcast.</strong></p><p>The Hub of the Infosec Community.&nbsp;</p><p>Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.&nbsp;</p><p>Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.</p><p>&nbsp;</p><p class="ql-align-justify">For Collaboration and Business inquiries, please use the contact information below:</p><p class="ql-align-justify">📩 Email:&nbsp;<a href="mailto:info@cyberhubpodcast.com" rel="noopener noreferrer" target="_blank">info@cyberhubpodcast.com</a>&nbsp;</p><p class="ql-align-justify"><br></p><p>🔔 Make sure to subscribe and follow us on your favorite podcast-listening platform.</p><p><a href="https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1</a>&nbsp;</p><p>=================================</p><p>#ransomware #cybersecurity #zeroday #dataprotection #cyberattacks #cyberwar #cybernews #infosecnews</p><p class="ql-align-justify"><strong>Disclaimer: </strong>We do not accept any liability for any loss or damage incurred from you acting or not acting as a result of watching any of our publications. You acknowledge that you use the information we provide at your own risk. Do your own research.&nbsp;</p><p class="ql-align-justify"><strong>Copyright Notice: </strong>This video and our YouTube channel contain dialogue, music, and images that are the property of <strong>The CyberHub Podcast. </strong>You are authorized to share the video link and channel and embed this video in your website or others as long as a link back to our YouTube channel is provided.&nbsp;</p><p>© The CyberHub Podcast</p>]]></content:encoded><link><![CDATA[https://www.cyberhubpodcast.com]]></link><guid isPermaLink="false">1c56ffa1-c19f-4161-b387-df26fc673589</guid><itunes:image href="https://artwork.captivate.fm/abfdfcb7-2479-484b-8251-5c76afafe6a2/ISPQb3CBgjOR8LI3NHtPQoBP.jpg"/><pubDate>Thu, 10 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8190b911-bebf-4f8e-acc8-57cccac7ca55/Internet-Archive-Data-Breach-Marriott-Fined-over-Data-Breach-AI.mp3" length="27027512" type="audio/mpeg"/><itunes:duration>18:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>791</itunes:episode><podcast:episode>791</podcast:episode></item></channel></rss>