Cybersecurity Headlines
FCC bans foreign routers Drone activity disrupts AWS region Crunchyroll confirmed data leak Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/ Huge thanks to our sponsor, ThreatLocker Least privilege isn’t about distrusting users — it’s about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can’t easily escalate access or move laterally across the environment. Learn more at
info_outlineCybersecurity Headlines
New DarkSword exploit hits GitHub Gemini AI agents scour the dark web Trivy supply chain attack expands Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/ Huge thanks to our sponsor, ThreatLocker Ransomware doesn’t need to be sophisticated if it’s allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized...
info_outlineCybersecurity Headlines
Link to This week’s Department of Know is hosted by with guests , CISO, , and , Field CTO, Thanks to our show sponsor, ThreatLocker Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That’s why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at All links and the video of this episode can be found on
info_outlineCybersecurity Headlines
Law enforcement seizes botnet infrastructure California city and LA transit agency report cybersecurity issues Microsoft Azure Monitor alerts used for callback phishing attacks Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-cybersecurity-news-international-botnet-takedown-california-city-ransomed-azure-monitor-phishing/ Huge thanks to our sponsor, ThreatLocker Most breaches don’t start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding...
info_outlineCybersecurity Headlines
Critical Microsoft SharePoint flaw now exploited in attacks 1stProtect reveals endpoint security platform intended to prevent cyberattacks in real time CISA urges U.S. organizations to secure Microsoft Intune systems following Stryker breach Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-critical-sharepoint-flaw-real-time-cyberattack-prevention-cisas-intune-warning/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by the first security awareness platform built to stop AI-powered social engineering. Picture a...
info_outlineCybersecurity Headlines
DarkSword emerges from suspected Russian hackers "ShieldGuard" dismantled after malware discovery North Korea's fake IT worker army rakes in $500M/year Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-darksword-emerges-shieldguard-dismantled-nk-it-worker-army-rakes-in-money/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Picture a “new hire” who interviews well… except they’re synthetic: AI video, AI voice, AI backstory....
info_outlineCybersecurity Headlines
Energy Department to release first cyber strategy Tech giants sign on to fight scammers Font-rendering hides malicious commands from AI in plain sight Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-energy-strategy-scammer-accord-font-rendering-attack/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Attackers don’t need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or...
info_outlineCybersecurity Headlines
Stryker hospital tools safe, digital ordering services down Models apply to be the face of AI scams Cybercrime up 245% since Iran conflict Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-stryker-hospital-tools-safe-models-apply-to-power-ai-scams-cybercrime-up-245/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Today’s phishing doesn’t just hit inboxes — it can sound like your CFO or look like your CEO on Zoom. AI voices,...
info_outlineCybersecurity Headlines
Link to This week’s Department of Know is hosted by with guests , CISO, , and Chris Ray, Field CTO, Thanks to our show sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren’t science fiction anymore; they’re a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at . All links and...
info_outlineCybersecurity Headlines
Payload Ransomware group claims breached of Royal Bahrain Hospital Canadian food retailer Loblaw confirms data breach New York cyber regulations for water organizations launch in 2027 Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-royal-bahrain-hospital-breach-canadas-loblaw-breached-new-york-water-laws/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by , the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren’t science fiction anymore; they’re a daily threat. Quick...
info_outlineFCC bans foreign routers
Drone activity disrupts AWS region
Crunchyroll confirmed data leak
Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/
Huge thanks to our sponsor, ThreatLocker
Least privilege isn’t about distrusting users — it’s about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can’t easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com
