Powered by RND
PodcastsGovernmentThe Gate 15 Podcast Channel

The Gate 15 Podcast Channel

Gate 15
The Gate 15 Podcast Channel
Latest episode

Available Episodes

5 of 316
  • Weekly Security Sprint EP 122. FBI Crime Report, Cyber Threats and be ready for the weather
    In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Physical Security: • FBI Releases 2024 Reported Crimes in the Nation Statisticso Hate crimes hit second largest record in 2024: FBIo Crime down in every category in 2024, FBI report sayso Jews targeted in 69% of religion hate crimes in 2024, 71% since October 2023, per FBI datao FBI Report: Anti-Jewish Hate Crimes Across U.S. Nearly 10x Higher Than Any Other Groupo NYC Sees Drop in Antisemitic Hate Crimes, Yet Jews Still Targeted Most, Police Say• CDC shooter blamed COVID vaccine for depression; union demands statement against misinformationo CDC Shooter Believed Covid Vaccine Made Him Suicidal, His Father Tells Policeo Suspect identified in Atlanta shooting outside CDC: What to know• Shooter kills three in a Target parking lot in Austin before being captured, police sayo Child among 3 killed in north Austin shooting, suspect detainedo 'I was running for my life' | 3 dead in shooting at North Austin TargetThe Cost of a Call: From Voice Phishing to Data Extortion - Update (August 5) & Google says hackers stole its customers’ data by breaching its Salesforce databaseHackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home; For likely the first time ever, security researchers have shown how AI can be hacked to create real-world havoc, allowing them to turn off lights, open smart shutters, and more. In a new apartment in Tel Aviv, the internet-connected lights go out. The smart shutters covering its four living room and kitchen windows start to roll up simultaneously. And a connected boiler is remotely turned on, ready to start warming up the stylish flat. The apartment’s residents didn’t trigger any of these actions. They didn’t put their smart devices on a schedule. They are, in fact, under attack. Each unexpected action is orchestrated by three security researchers demonstrating a sophisticated hijack of Gemini, Google’s flagship artificial intelligence bot. Quick Hits:• NOAA - Prediction remains on track for above-normal Atlantic hurricane season• New state, local cyber grant rules prohibit spending on MS-ISAC• Joint Counterterrorism Assessment Team (JCAT): Hybrid and Electric Vehicle Emergency Planning and Postattack Response Considerations• Canadian Centre for Cyber Security - Potential SSL VPN Zero-Day vulnerability impacting Gen 7 SonicWall Firewalls• SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation• Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments • CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities• CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability • Leak Reveals the Workaday Lives of North Korean IT Scammers • US companies spending record amounts to protect executives as threats rise• Mysterious Crime Spree Targeted National Guard Equipment Stashes• American Nazis: The Aryan Freedom Network is riding high in Trump era• Florida Man Sentenced to 20 Years for Conspiring to Destroy Baltimore Region Power Grid & Neo-Nazi leader sentenced to 20 years for plotting Baltimore power grid attack• Leader of Transnational Terrorist Group Pleads Guilty to Soliciting Hate Crimes, Soliciting the Murder of Federal Officials, and Conspiring to Provide Material Support to Terrorists
    --------  
    20:01
  • Weekly Security Sprint EP 121. Hostile events and grievances, Cyber reports, and government funding
    In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• Decrypted: FunkSec Ransomware; Avast releases free decryptor for AI-assisted FunkSec ransomware & Skip directly to the decryptor download. Main Topics:Hostile Events:• NYC shooting at heavily secured office building raises questions about what more can be done • FBI Arrests Dayton Man for Making Social Media Post Threatening to Kill Tens of Thousands & Man accused of threatening to kill 30K Black people in Cincinnati days after megaviral attack video• Tennessee man threatened to kill public officials, kept explosive devices in his home, authorities sayCyber Threat Reports: • CrowdStrike 2025 Threat Hunting Report: AI Becomes a Weapon and a Target• Censys: 2025 State of the Internet: Malware Investigations• Forescout - Midyear Threat Report: Numbers Grow in Nearly All the Wrong Places• Cside: Client-Side Attack Report Q2 2025DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses Quick Hits:• FBI PSA - Unsolicited Packages Containing QR Codes Used to Initiate Fraud Schemes• Leading phone repair and insurance firm collapses after paying crippling ransomware demand — Cutting 100+ employees to just eight wasn’t enough• Canadian Centre for Cyber Security - Security considerations for critical infrastructure (ITSAP.10.100)• Iran hiring criminal networks in Europe to attack Jews, US religious freedom report finds• UNC2891 Bank Heist: Physical ATM Backdoor & Linux Forensic Evasion Evasion• Swedish crypto exchange Trijo hacked for 7.8 MSEK
    --------  
    21:22
  • Weekly Security Sprint EP 120. Active Shooters, Bystanders, and exploiting Vulnerabilities
    On this week's Security Sprint, Dave is solo and talked about the following topics.Warm Opening.Check out the blogs on the Gate 15 website including the recent one on network segmentation (www.gate15.global). https://gate15.global/digital-firebreaks/Main Topics.NYC active shooter incident. https://www.nbcnews.com/news/us-news/nyc-shooting-suspect-shane-devon-temura-what-know-rcna221638Walmart incident and bystanders. https://www.nbcnews.com/news/us-news/walmart-stabbings-michigan-traverse-city-suspect-terrorism-what-know-rcna221445CISA Active Shooter resources: https://www.cisa.gov/topics/physical-security/active-shooter-preparednessChinese ‘Fire Ant’ spies start to bite unpatched VMware instances. https://www.csoonline.com/article/4029545/chinese-fire-ant-spies-start-to-bite-unpatched-vmware-instances.htmlSygnia Uncovers Active Chinese-Nexus Threat Actor Targeting Critical Infrastructure. https://www.sygnia.co/press-release/sygnia-uncovers-chinese-threat-targeting-critical-infrastructure/
    --------  
    15:08
  • Nerd Out EP 60. Cyber fundamentals and nerding out with Hunter
    In the latest Nerd Out, Alec and Dave welcome in Hunter Headapohl to talk about the cyber basics, and why so many threats can be prevented by following appropriate cyber hygiene. Alec and Hunter share their best practices and some of their tools and resources that can be leveraged to mitigate risk.Some of the references from the pod include:Top Cyber Actions for Securing Water Systems - https://www.cisa.gov/resources-tools/resources/top-cyber-actions-securing-water-systemsDefending OT Operations Against Ongoing Pro-Russia Hacktivist Activity - https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activityIRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335aChina Strategically Infiltrates U.S. Critical Infrastructure as Cyberattacks Escalate - https://thesoufancenter.org/intelbrief-2025-january-10/Secure by Design - https://www.cisa.gov/securebydesignCISA Training - https://www.cisa.gov/resources-tools/training
    --------  
    44:55
  • Weekly Security Sprint EP 119. Cyber fundamentals - third party management, passwords, and patching - plus P2D2!
    In this week's Security Sprint, Dave and Andy covered the following topics: Warm Open:• 26th Annual TribalNet Conference & Tradeshow• The Gate 15 Interview EP 60 – Sasha Larkin: “I like the chaos, chaos makes sense to me.” • The SUN will not be published the week of 28 Jul – 01 Aug. The SUN will resume the following week.• P2D2!Main Topics:Microsoft, China & Vendor Risk Management:• A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers• US senator seeks details from Defense Department on Microsoft's Chinese engineers• Microsoft says it will no longer use engineers in China for Department of Defense work• Chairmen Gimenez, Moolenaar, Self Probe Tech Companies Over Risks To Undersea Telecom InfrastructurePasswords. Weak password allowed hackers to sink a 158-year-old companyPatching!• Microsoft SharePoint vulnerability CVE-2025-53770: Microsoft: Customer guidance for SharePoint vulnerability CVE-2025-53770 & UK NCSC: Active exploitation of vulnerability affecting Microsoft Office SharePoint Server products in the UK• Canadian Centre for Cyber Security: CrushFTP security advisory (AV25-432)• CISA Adds One Known Exploited Vulnerability to Catalog - CVE-2025-25257 Fortinet FortiWeb SQL Injection Vulnerability• CitrixBleed 2 situation update — everybody already got owned• Canadian Centre for Cyber Security - Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 2 Managing Politics and BiasQuick Hits:• National Guard hacked by Chinese 'Salt Typhoon' campaign for nearly a year, DHS memo says• Charter Calls Increased Critical Infrastructure Attacks on Spectrum Network in Missouri Acts of Domestic Terrorism• UK NPSA - Security-Minded Communications - Guidance for Remote and Rural Locations • Canadian Centre for Cyber Security (CCCS) & Canadian Anti-Fraud Centre (CAFC) Joint Advisory: Cyber officials warns of malicious campaign to impersonate high-profile public figures• Examining How International Hacktivist Groups Pursue Attention, Select Targets, and Interact in an Evolving Online Landscape• China’s cyber sector amplifies Beijing’s hacking of U.S. targets• Submarine Cables Face Increasing Threats Amid Geopolitical Tensions and Limited Repair Capacity• Of course, Grok’s AI companions want to have sex and burn down schools• Investor Alert: Look Out For Possible Investment Scams Related to the Texas Floods • The Amnban Files: Inside Iran's Cyber-Espionage Factory Targeting Global Airlines• Indian crypto exchange CoinDCX hacked, $44M drained
    --------  
    23:14

More Government podcasts

About The Gate 15 Podcast Channel

The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.
Podcast website

Listen to The Gate 15 Podcast Channel, Strict Scrutiny and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.23.1 | © 2007-2025 radio.de GmbH
Generated: 8/16/2025 - 2:31:12 PM