loader from loading.io

DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands

Cybersecurity Headlines

Release Date: 03/24/2026

FCC router ban, drone hit AWS, Crunchroll leak show art FCC router ban, drone hit AWS, Crunchroll leak

Cybersecurity Headlines

FCC bans foreign routers Drone activity disrupts AWS region Crunchyroll confirmed data leak Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/ Huge thanks to our sponsor, ThreatLocker Least privilege isn’t about distrusting users — it’s about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can’t easily escalate access or move laterally across the environment. Learn more at

info_outline
DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands show art DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands

Cybersecurity Headlines

New DarkSword exploit hits GitHub Gemini AI agents scour the dark web Trivy supply chain attack expands Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/ Huge thanks to our sponsor, ThreatLocker Ransomware doesn’t need to be sophisticated if it’s allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized...

info_outline
Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown show art Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown

Cybersecurity Headlines

Link to This week’s Department of Know is hosted by with guests , CISO, , and , Field CTO, Thanks to our show sponsor, ThreatLocker Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That’s why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at All links and the video of this episode can be found on  

info_outline
International botnet takedown, California city ransomed, Azure Monitor phishing show art International botnet takedown, California city ransomed, Azure Monitor phishing

Cybersecurity Headlines

Law enforcement seizes botnet infrastructure California city and LA transit agency report cybersecurity issues Microsoft Azure Monitor alerts used for callback phishing attacks  Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-cybersecurity-news-international-botnet-takedown-california-city-ransomed-azure-monitor-phishing/ Huge thanks to our sponsor, ThreatLocker Most breaches don’t start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding...

info_outline
Critical SharePoint flaw, real-time cyberattack prevention, CISA’s Intune warning show art Critical SharePoint flaw, real-time cyberattack prevention, CISA’s Intune warning

Cybersecurity Headlines

Critical Microsoft SharePoint flaw now exploited in attacks 1stProtect reveals endpoint security platform intended to prevent cyberattacks in real time CISA urges U.S. organizations to secure Microsoft Intune systems following Stryker breach Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-critical-sharepoint-flaw-real-time-cyberattack-prevention-cisas-intune-warning/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by the first security awareness platform built to stop AI-powered social engineering. Picture a...

info_outline
DarkSword emerges, DarkSword emerges, "ShieldGuard" dismantled, NK IT worker army rakes in money

Cybersecurity Headlines

DarkSword emerges from suspected Russian hackers "ShieldGuard" dismantled after malware discovery North Korea's fake IT worker army rakes in $500M/year Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-darksword-emerges-shieldguard-dismantled-nk-it-worker-army-rakes-in-money/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Picture a “new hire” who interviews well… except they’re synthetic: AI video, AI voice, AI backstory....

info_outline
Energy strategy, scammer accord, font-rendering attack show art Energy strategy, scammer accord, font-rendering attack

Cybersecurity Headlines

Energy Department to release first cyber strategy Tech giants sign on to fight scammers Font-rendering hides malicious commands from AI in plain sight Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-energy-strategy-scammer-accord-font-rendering-attack/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Attackers don’t need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or...

info_outline
Stryker hospital tools safe, models apply to power AI scams, cybercrime up 245% show art Stryker hospital tools safe, models apply to power AI scams, cybercrime up 245%

Cybersecurity Headlines

Stryker hospital tools safe, digital ordering services down Models apply to be the face of AI scams Cybercrime up 245% since Iran conflict Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-stryker-hospital-tools-safe-models-apply-to-power-ai-scams-cybercrime-up-245/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Today’s phishing doesn’t just hit inboxes — it can sound like your CFO or look like your CEO on Zoom. AI voices,...

info_outline
Department of Know: OpenAI vulnerability scanner, US new cyber strategy, VPN SEO poisoning show art Department of Know: OpenAI vulnerability scanner, US new cyber strategy, VPN SEO poisoning

Cybersecurity Headlines

Link to This week’s Department of Know is hosted by with guests , CISO, , and Chris Ray, Field CTO, Thanks to our show sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren’t science fiction anymore; they’re a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at . All links and...

info_outline
Royal Bahrain Hospital breach, Canada’s Loblaw breached, New York water laws show art Royal Bahrain Hospital breach, Canada’s Loblaw breached, New York water laws

Cybersecurity Headlines

Payload Ransomware group claims breached of Royal Bahrain Hospital Canadian food retailer Loblaw confirms data breach New York cyber regulations for water organizations launch in 2027 Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-royal-bahrain-hospital-breach-canadas-loblaw-breached-new-york-water-laws/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren’t science fiction anymore; they’re a daily threat. Quick...

info_outline
 
More Episodes

New DarkSword exploit hits GitHub

Gemini AI agents scour the dark web

Trivy supply chain attack expands

Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/

Huge thanks to our sponsor, ThreatLocker

Ransomware doesn’t need to be sophisticated if it’s allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com