Episodios

  • Gloves Off: Operation Epic Fury and the Trump Administration 2026 Cyber Strategy
    Mar 9 2026

    In this episode, we dive into the escalating military and cyber conflict between the United States and Iran, highlighted by the devastating U.S. strikes of Operation Epic Fury. We unpack the administration's aggressive new 2026 "Cyber Strategy for America" and recent Executive Orders, which signal a doctrinal shift toward offensive operations, deregulation, and the dismantling of transnational cybercrime networks. Join us as we explore the geopolitical and legal fallout of "unleashing" private tech companies to actively defend against adversaries, and how artificial intelligence is rapidly shaping the future of global security.

    • https://securitycareers.help/president-trumps-cyber-strategy-for-america-2026-six-pillars-reshaping-national-cybersecurity
    • https://compliancehub.wiki/trump-cyber-strategy-2026-compliance-implications
    • https://scamwatchhq.com/white-house-executive-order-cybercrime-scams-2026

    Sponsors:

    www.cisomarketplace.com

    www.breached.company

    Más Menos
    43 m
  • Critical Resilience: Defending Energy and Water in 2026
    Mar 8 2026

    As nation-state actors and hacktivist proxies increasingly target operational technology (OT) across the energy and water sectors, the 2026 cybersecurity landscape has reached a critical inflection point. In response to this escalating risk, sweeping new regulatory mandates—such as the NERC CIP Roadmap, permanent TSA pipeline directives, and CIRCIA—are forcing organizations to shift away from traditional perimeter defenses and adopt maturity-based risk management. This episode explores the active threat groups currently pre-positioning within critical networks, breaks down impending compliance deadlines, and outlines how organizations can strategically prioritize their budgets to build true operational resilience.

    • https://secureiotoffice.world/water-infrastructure-cyberattacks-desalination-iran-war
    • https://secureiotoffice.world/power-grid-attacks-smart-city-blackouts-iran-iraq
    • https://cisomarketplace.com/blog/operational-technology-critical-infrastructure-security-2026-strategic-briefing

    Sponsors:

    www.cisomarketplace.com

    www.cisomarketplace.services

    www.breached.company

    Más Menos
    57 m
  • When the Cloud Burns: Missiles, Rogue AI, and the Fragility of Global Infrastructure
    Mar 7 2026

    In 2025 and 2026, the illusion of an invincible cloud was shattered by a convergence of unprecedented threats, ranging from Iranian drone strikes physically destroying AWS and Azure data centers in the Gulf to an Amazon AI coding agent autonomously wiping out a production environment. These kinetic and AI-driven disasters, alongside massive configuration failures at Microsoft and Cloudflare, exposed the terrifying reality that our entire digital economy relies on a few hyper-scale providers acting as unacknowledged critical infrastructure. Join us as we unpack why traditional disaster recovery models are officially obsolete and discuss the immediate steps security leaders must take to ensure survival in an era where cloud platforms are active battlegrounds.

    https://cisomarketplace.com/blog/when-the-cloud-burns-disaster-recovery-backup-and-cloud-redundancy-in-2026

    https://cisomarketplace.com/blog/when-the-cloud-burns-part-ii-iran-targets-microsoft-azure-gulf

    Sponsors:

    www.cisomarketplace.com

    www.cisomarketplace.services

    Más Menos
    53 m
  • Beyond the Takedown: Measuring True Impact in the Ransomware War
    Mar 6 2026

    Law enforcement agencies are increasingly striking back against ransomware syndicates, but highly visible operations do not always translate into long-term success. In this episode, we explore a newly developed framework that systematically evaluates counter-ransomware interventions across four key dimensions: severity, scope, longevity and reversibility, and signalling value. By examining high-profile case studies like the disruptions of LockBit and Hive, we uncover the complex trade-offs involved in tackling cybercrime and discuss how policymakers can design strategies that move past temporary setbacks to inflict lasting damage on the ransomware ecosystem.

    https://breached.company/operation-leak-fbi-and-global-partners-dismantle-leakbase-one-of-the-worlds-largest-cybercriminal-data-forums

    Sponsors:

    www.breached.company

    www.cisomarketplace.com

    Más Menos
    10 m
  • Echoes of Epic Fury: The Convergence of AI, Cyber, and Kinetic Warfare
    Mar 5 2026

    In early 2026, Operation Epic Fury shattered the traditional boundaries of conflict by seamlessly synchronizing devastating kinetic airstrikes with an unprecedented four-pronged cyber assault that plunged Iran into a near-total digital blackout. Behind the scenes, military commanders controversially relied on Anthropic's Claude AI for rapid intelligence assessments and target identification, fundamentally altering the speed and cognitive load of modern battle. However, this historic fusion of digital and physical warfare also exposed critical new global vulnerabilities, ranging from the physical destruction of vital cloud data centers to a relentless wave of hacktivist retaliation utilizing commercial satellite networks to bypass the blackout

    • https://breached.company/operation-roaring-lion-the-cyberattack-that-rewrote-the-rules-of-modern-warfare
    • https://breached.company/when-the-cloud-burns-the-aws-uae-data-center-disaster-and-the-dr-bcp-lessons-everyone-keeps-ignoring
    • https://breached.company/the-cyber-war-in-the-shadows-how-the-2026-iran-israel-u-s-conflict-is-reshaping-the-middle-easts-digital-battlefield
    • https://breached.company/banned-at-dawn-deployed-by-dusk-the-u-s-used-anthropics-claude-in-the-iran-strikes-hours-after-trump-banned-it/

    Sponsor:

    www.cisomarketplace.com

    www.breached.company

    Más Menos
    39 m
  • Growing Up in the Online World: The UK's National Conversation
    Mar 4 2026

    This episode dives into the UK government's 2026 consultation on how to better protect children and enrich their experiences in a fast-paced digital world. We explore major proposed interventions, including potential bans on social media for under-16s, mandatory daily screentime limits, and new rules restricting addictive design features like infinite scrolling and autoplay. Join us as we unpack the crucial balance between safeguarding kids from emerging online harms—such as emotionally manipulative AI chatbots—while ensuring they build the essential digital skills needed for the future.

    Sponsors:

    www.myprivacy.blog

    www.scamwatchhq.com

    Más Menos
    20 m
  • Shadows in the Screen: Unmasking 'The Com' and the 764 Network
    Mar 3 2026

    Dive into the dark reality of "The Com" and the notorious "764" network, sophisticated online ecosystems where digital predators use popular games and social media platforms to groom, extort, and radicalize vulnerable youth. We explore Europol's global initiative, Project Compass, alongside unprecedented international law enforcement efforts aimed at dismantling these decentralized and violent groups. Finally, we equip parents with crucial "operational security" strategies and behavioral red flags to help protect their families' digital privacy and recognize the early warning signs of online exploitation.

    • https://myprivacy.blog/the-7m-tiktok-cult-fbi-raids-escalate-investigation-into-alleged-sex-trafficking-and-financial-exploitation
    • https://myprivacy.blog/the-764-network-how-predators-exploit-children-through-gaming-and-social-media
    • https://myprivacy.blog/protecting-your-familys-digital-privacy-from-the-com-what-parents-need-to-know

    Sponsor:

    www.myprivacy.blog

    Más Menos
    21 m
  • Industrialized Deception: Navigating the 2025 Payment Fraud Landscape
    Mar 2 2026

    In this episode, we explore how the global fraud ecosystem has industrialized, equipping cybercriminals with highly scalable tools like Malware-as-a-Service e-skimmer kits and AI-powered purchase scams. We dive into the most pressing emerging threats, including the opaque risks of AI-driven agentic commerce and the rising popularity of one-time password (OTP) interception to enable digital wallet fraud. Finally, we discuss how financial institutions and merchants can fight back by abandoning reactive models in favor of proactive, cross-functional cyber-fraud fusion centers.

    Sponsors:

    www.scamwatchhq.com

    Más Menos
    Aún no se conoce