PodcastsNewsCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Latest episode

1719 episodes

  • Cybersecurity Headlines

    Rituals cosmetics breach, FBI iOS flaw fixed, Teams Helpdesk impersonation

    24/04/2026 | 8 mins.
    Cosmetics giant Rituals discloses data breach
    Apple fixes iOS flaw exploited by the FBI
    Microsoft Teams Helpdesk impersonation
    Get the show notes here: https://cisoseries.com/cybersecurity-news-rituals-cosmetics-breach-fbi-ios-flaw-fixed-teams-helpdesk-malware-impersonation/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts

    23/04/2026 | 7 mins.
    OpenAI shares cyber product with government orgs
    Unauthorized Mythos access, Firebox bugs fixed by Mythos
    Insurers move to cap LLMjacking cyber payouts
    Get the show notes here: https://cisoseries.com/cybersecurity-news-new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-payouts/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    CISA lacks Mythos, Lovable's leak by design, YouTube's deepfake detection

    22/04/2026 | 7 mins.
    CISA lacks Mythos access
    Lovable denies data leak
    YouTube opens up deepfake detection tool
    Get the show notes here: https://cisoseries.com/cybersecurity-news-cisa-lacks-mythos-lovables-leak-by-design-youtubes-deepfake-detection/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS

    21/04/2026 | 7 mins.
    Vercel confirms breach, stolen data for sale
    ZionSiphon targets water infrastructure
    Bluesky blames outage on DDoS
    Get the show notes here: https://cisoseries.com/cybersecurity-news-vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    London hospital ransomware legacy, PowerOFF takedown, Microsoft RedSun zero-day

    20/04/2026 | 8 mins.
    London hospitals continue to suffer from 2024 ransomware attack
    Four arrested in PowerOFF takedown
    Microsoft Defender "RedSun" zero-day 
    Get the show notes here: https://cisoseries.com/cybersecurity-news-london-hospital-ransomware-legacy-poweroff-takedown-microsoft-redsun-zero-day/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.

More News podcasts

About Cybersecurity Headlines

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Podcast website

Listen to Cybersecurity Headlines, The Rest Is Politics and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Cybersecurity Headlines: Podcasts in Family

Social
v8.8.12| © 2007-2026 radio.de GmbH
Generated: 4/24/2026 - 8:48:37 AM