
Cybersecurity Headlines
Technology Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Location:
United States
Genres:
Technology Podcasts
Description:
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Twitter:
@dspark
Language:
English
Website:
http://cisoseries.com/
Email:
info@cisoseries.com
Episodes
Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS
4/21/2026
Vercel confirms breach, stolen data for sale
ZionSiphon targets water infrastructure
Bluesky blames outage on DDoS
Get the show notes here: https://cisoseries.com/cybersecurity-news-vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/
Huge thanks to our sponsor, ThreatLocker
ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
Duración:00:07:39
London hospital ransomware legacy, PowerOFF takedown, Microsoft RedSun zero-day
4/20/2026
London hospitals continue to suffer from 2024 ransomware attack
Four arrested in PowerOFF takedown
Microsoft Defender "RedSun" zero-day
Get the show notes here: https://cisoseries.com/cybersecurity-news-london-hospital-ransomware-legacy-poweroff-takedown-microsoft-redsun-zero-day/
Huge thanks to our sponsor, ThreatLocker
ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
Duración:00:08:50
The Department of Know: Mythos Mayhem, critical infrastructure targeted, NVD changes
4/17/2026
Link to episode page
This week's Department of Know is hosted by Rich Stroffolino, with guests Andrew Storms, security engineering, Kilo Code, and Eduardo Ortiz-Romeu, VP, global head of cybersecurity, Techtronic Industries.
Missed the live show? Check it out on YouTube.
Huge thanks to our sponsor, Conveyor
Happy Friday. Hope there isn't a fresh security questionnaire sitting in your inbox right now.
If there is, here's something worth knowing. The teams that have fully automated their customer security reviews didn't just get a better trust center. They switched to an AI platform built for the whole workflow. Conveyor handles trust center, questionnaire automation, and self-serve for sales, all in one place, with AI keeping the knowledge base current so answers are always accurate.
Learn why enterprise SaaS teams choose Conveyor at conveyor.com.
Duración:00:38:04
Cisco Webex warning, Splunk's Enterprise fix, Git spoof tricks Claude
4/17/2026
Cisco posts urgent Webex Services warning
Splunk issues fixes for Enterprise vulnerability
Git identity spoof tricks Claude into approving bad code
Get the show notes here: https://cisoseries.com/cybersecurity-news-cisco-webex-warning-splunks-enterprise-fix-git-spoof-tricks-claude/
Huge thanks to our sponsor, Conveyor
Happy Friday. Hope there isn't a fresh security questionnaire sitting in your inbox right now. If there is, here's something worth knowing.
The teams that have fully automated their customer security reviews didn't just get a better trust center.
They switched to an AI platform built for the whole workflow.
Conveyor handles trust center, questionnaire automation, and self-serve for sales, all in one place, with AI keeping the knowledge base current so answers are always accurate. Learn why enterprise SaaS teams choose Conveyor at conveyor.com.
Duración:00:08:00
OpenAI's GPT-5.4-Cyber, McGraw Hill blames Salesforce for breach, signed adware disables antivirus
4/16/2026
OpenAI rolls out GPT-5.4-Cyber
McGraw Hill breach due to Salesforce misconfig
Signed adware operation disables antivirus
Get the show notes here: https://cisoseries.com/cybersecurity-news-openais-gpt-5-4-cyber-mcgraw-hill-blames-salesforce-for-breach-signed-adware-disables-antivirus/
Huge thanks to our sponsor, Conveyor
At some point, every fast-growing SaaS team hits the same wall.
The trust center is live. The SOC 2 is published. And somehow the security questionnaires just keep piling up.
That's when teams realize a static trust center isn't the finish line. Conveyor is what comes next. AI that completes questionnaires automatically. A trust center customers can actually self-serve. And a knowledge base that updates itself with AI.
Companies like Atlassian and Zapier are already there. See what's possible at conveyor.com.
Duración:00:06:35
Ransomware drama, faked Ledger app, Treasury wants Mythos
4/15/2026
Ransomware rivals turn on each other
Fake Ledger app drains millions in crypto
US Treasury wants access to Mythos
Get the show notes here: https://cisoseries.com/cybersecurity-news-ransomware-drama-faked-ledger-app-treasury-wants-mythos/
Huge thanks to our sponsor, Conveyor
Your trust center was a great start. But if your team is still manually answering questionnaires and fielding sales questions, it hasn't solved the problem.
Conveyor goes beyond a trust center.
You get a living knowledge library your AI keeps up to date, questionnaire automation that handles any format, and a self-serve experience so customers and sales teams get answers without looping in infosec.
Top enterprise SaaS companies trust Conveyor to handle it all. Check it out at conveyor.com.
Duración:00:07:29
Claude Mythos Preview's capabilities, Anodot breached companies face extortion, wolfSSL flaw enables forged certificates
4/14/2026
Claude Mythos Preview's cyber capabilities
Anodot hack leaves breached companies facing extortion
wolfSSL library flaw enables forged certificate use
Get the show notes here: https://cisoseries.com/cybersecurity-news-claude-mythos-previews-capabilities-anodot-breached-companies-face-extortion-wolfssl-flaw-enables-forged-certificates/
Huge thanks to our sponsor, Conveyor
Three tools to manage customer security reviews is two too many.
Most teams start with a trust center, bolt on a questionnaire tool, and end up with a knowledge base nobody trusts and a Slack channel full of sales pings anyway.
Conveyor replaces all of it. Trust center, questionnaire automation, self-serve for sales, AI-managed knowledge library, one platform.
Companies like Atlassian and Zapier already made the switch. See why at conveyor.com.
Duración:00:07:34
The Department of Know is Moving to Fridays
4/13/2026
A quick announcement: we're moving our Department of Know livestream to Fridays at 4pm ET/1 pm PT. The format will remain the same. We hope to see you there.
Duración:00:01:17
Adobe patches zero-day, Marimo flaw exploited, Venice flood threat
4/13/2026
Adobe patches months-old Reader zero-day
Critical Marimo flaw now under active exploitation
Hackers claim control over Venice anti-flood pumps
Get the show notes here: https://cisoseries.com/cybersecurity-news-adobe-patches-zero-day-marimo-flaw-exploited-venice-flood-threat/
Huge thanks to our sponsor, Conveyor
Still manually filling out security questionnaires even though you have a trust center?
A starter trust center is table stakes and the best security teams have moved way past that.
Conveyor gives you an agentic trust center, AI questionnaire automation, and a self-serve layer so sales can move deals forward without pinging you every five minutes.
Companies like Atlassian and Zapier made the switch. See why at conveyor.com.
Duración:00:07:07
Android API exposure, Acrobat Reader zero-day, Bitcoin Depot cyberattack
4/10/2026
Google API keys in Android apps expose Gemini endpoints
Acrobat Reader zero-day flaw exploited since December
Cryptocurrency ATM company Bitcoin Depot reports cyberattack
Check out our show notes here: https://cisoseries.com/cybersecurity-news-android-api-exposure-acrobat-reader-zero-day-bitcoin-depot-cyberattack/
Huge thanks to our episode sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:08:38
ChipSoft popped, APT28 updates, CIA cyber espionage elevation
4/9/2026
Ransomware knocks Dutch healthcare vendor offline
APT28 is keeping busy
CIA quietly elevated its cyber espionage division
Check out our show notes here: https://cisoseries.com/cybersecurity-news-chipsoft-popped-apt28-updates-cia-cyber-espionage-elevation/
Huge thanks to our episode sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:07:26
Anthropic's Project Glasswing, CISA funding in doubt, routers hijacked for passwords
4/8/2026
Anthropic announces Project Glasswing
U.S. seeks to slash CISA funding
Russia-linked hackers hijack routers for passwords
Check out our show notes here: https://cisoseries.com/cybersecurity-news-anthropics-project-glasswing-cisa-funding-in-doubt-routers-hijacked-for-passwords/
Huge thanks to our episode sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:07:17
Drift blames exploit on North Korea, GitHub attacks target South Korea, Die Linke breach threatens data leak
4/7/2026
Drift says exploit was North Korean intelligence operation
GitHub used in multi-stage attacks targeting South Korea
Data leak threatened after Die Linke attack
Check out our show notes here: https://cisoseries.com/cybersecurity-news-drift-blames-exploit-on-north-korea-github-attacks-target-south-korea-die-linke-breach-threatens-data-leak/
Huge thanks to our episode sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:07:41
Department of Know: Axios malware, TeamPCP campaign, New Storm infostealer
4/6/2026
Link to episode page
This week's Department of Know is hosted by Sarah Lane, with guests Jack Kufahl, CISO, Michigan Medicine, and Adam Palmer, CISO, First Hawaiian Bank.
Missed the live show? Check it out on YouTube.
Huge thanks to our sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:31:35
Malicious npm packages, CISA budget cuts, hackers exploit React2Shell
4/6/2026
36 Malicious npm packages exploited to deploy persistent implants
Hundreds of millions to be cut from CISA in proposed budget
Hackers exploit React2Shell in automated credential theft campaign
Check out our show notes here: https://cisoseries.com/cybersecurity-news-malicious-npm-packages-cisa-budget-cuts-hackers-exploit-react2shell/
Huge thanks to our episode sponsor, Vanta
Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.
Duración:00:08:58
Texas hospital breach, CISA orders NetScaler patch, ISO file RAT warning
4/3/2026
250,000 affected by data Breach at Texas hospital
CISA says, "patch Citrix NetScaler bug by Thursday"
Researchers uncover mining operation using ISO lures
Get the show notes here: https://cisoseries.com/cybersecurity-news-texas-hospital-breach-cisa-orders-netscaler-patch-iso-file-rat-warning/
Huge thanks to our sponsor, ThreatLocker
Security controls fail when they break the business. Successful teams phase in protections gradually — starting with visibility, then moving to enforcement. That approach allows organizations to reduce risk without overwhelming IT teams or disrupting critical workflows. Learn more at ThreatLocker.com
Duración:00:08:15
New iOS patches over DarkSword, FBI: surveillance hack is major incident, Cisco code stolen in Trivy-linked breach
4/2/2026
Apple pushes new patches over DarkSword
FBI: US surveillance hack is major incident
Cisco code stolen in Trivy-linked breach
Get the show notes here: https://cisoseries.com/cybersecurity-news-apple-pushes-new-patches-over-darksword-fbi-us-surveillance-hack-is-major-incident-cisco-code-stolen-in-trivy-linked-breach/
Huge thanks to our sponsor, ThreatLocker
Detection-based security assumes you'll catch an attack in time. Control-based security assumes you won't. That mindset shift is driving more organizations to focus on preventative controls — stopping unknown execution and unauthorized privilege elevation instead of relying solely on alerts after the fact. Learn more at ThreatLocker.com
Duración:00:06:45
Axios poisoned, TeamPCP details, Claude Code leaked
4/1/2026
HTTP client introduces malicious dependency
TeamPCP testing the open source supply chain
Claude source code leaked
Get the show notes here: https://cisoseries.com/cybersecurity-news-axios-poisoned-teampcp-details-claude-code-leaked/
Huge thanks to our sponsor, ThreatLocker
Least privilege isn't about distrusting users — it's about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can't easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com
Duración:00:08:02
macOS Terminal ClickFix attacks, Russian court sentences 'Flint', CareCloud probes data breach
3/31/2026
macOS Terminal gets ClickFix attacks
Russian court sentences 'Flint' over card fraud
CareCloud probes data breach
Get the show notes here: https://cisoseries.com/cybersecurity-news-macos-terminal-clickfix-attacks-russian-court-sentences-flint-carecloud-probes-data-breach/
Huge thanks to our sponsor, ThreatLocker
Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com
Duración:00:08:08
Department of Know: Gemini scours dark web, NSA worries about cybersecurity, APIs run loose
3/30/2026
Link to episode page
This week's Department of Know is hosted by Rich Stroffolino with guests Dennis Pickett, vp, CISO, RTI International, and Jacob Combs, CISO, Tandem Diabetes Care
Thanks to our show sponsor, ThreatLocker
Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com
All links and the video of this episode can be found on CISO Series.com
Duración:00:35:49