<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:spotify="http://www.spotify.com/ns/rss">
    <channel>
        <title>Daily Cyber Security News</title>
        <generator>Castos</generator>
        <atom:link href="https://feeds.castos.com/735pj" rel="self" type="application/rss+xml" />
        <link>https://cybersecurity-news.castos.com</link>
        <description>Your daily update for cybersecurity news</description>
        <lastBuildDate>Thu, 09 Apr 2026 14:33:52 +0000</lastBuildDate>
        <language>en</language>
        <copyright>© 2023-2024</copyright>
        
        <spotify:limit recentCount="100" />
        
        <spotify:countryOfOrigin>
              
        </spotify:countryOfOrigin>
                    <image>
                <url>https://episodes.castos.com/6485957f09ee91-41670518/images/cybersecurity-now-cover.jpg</url>
                <title>Daily Cyber Security News</title>
                <link>https://cybersecurity-news.castos.com</link>
            </image>
                <itunes:subtitle>Your daily update for cybersecurity news</itunes:subtitle>
        <itunes:author>The Daily Dive</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:summary>Your daily update for cybersecurity news</itunes:summary>
        <itunes:owner>
            <itunes:name>The Daily Dive</itunes:name>
            <itunes:email>penpringle@gmail.com</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
                    <itunes:image href="https://episodes.castos.com/6485957f09ee91-41670518/images/cybersecurity-now-cover.jpg"></itunes:image>
        
                                    <itunes:category text="News">
                                            <itunes:category text="Tech News" />
                                    </itunes:category>
                    
                    <itunes:new-feed-url>https://feeds.castos.com/735pj</itunes:new-feed-url>
                
        
        <podcast:locked>yes</podcast:locked>
                                    <item>
                <title>
                    <![CDATA[AI in Vulnerability Discovery  An Introduction]]>
                </title>
                <pubDate>Thu, 09 Apr 2026 14:33:52 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2417471</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/ai-in-vulnerability-discovery-an-introduction</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  AI assisted vulnerability discovery, focussing on ai vuln overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  AI assisted vulnerability discovery, focussing on ai vuln overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[AI in Vulnerability Discovery  An Introduction]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  AI assisted vulnerability discovery, focussing on ai vuln overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2417471/c1e-7mq1guv90ddhd6vdp-qdprv5r3cnxz-bccabl.mp3" length="3103565"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  AI assisted vulnerability discovery, focussing on ai vuln overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Reconnaissance  Mapping the Target]]>
                </title>
                <pubDate>Thu, 02 Apr 2026 14:33:24 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2412409</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/reconnaissance-mapping-the-target</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Cyber Kill Chain, focussing on reconnaissance]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Cyber Kill Chain, focussing on reconnaissance]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Reconnaissance  Mapping the Target]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Cyber Kill Chain, focussing on reconnaissance]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2412409/c1e-39z0rawkp53fkq0kv-dm17v6k3fvgv-s9zcdh.mp3" length="3470115"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Cyber Kill Chain, focussing on reconnaissance]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is AI Red Teaming]]>
                </title>
                <pubDate>Thu, 26 Mar 2026 14:33:38 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2406211</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-ai-red-teaming</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  AI Red Teaming, focussing on introduction to ai red teaming]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  AI Red Teaming, focussing on introduction to ai red teaming]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is AI Red Teaming]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  AI Red Teaming, focussing on introduction to ai red teaming]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2406211/c1e-mo8v5t4qk1oswqppx-0v9nw0d2h72v-qpieq0.mp3" length="2789677"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  AI Red Teaming, focussing on introduction to ai red teaming]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Agentic AI]]>
                </title>
                <pubDate>Thu, 19 Mar 2026 14:34:54 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2400873</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-agentic-ai</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Agentic AI, focussing on Introduction to Agentic AI]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Agentic AI, focussing on Introduction to Agentic AI]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Agentic AI]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Agentic AI, focussing on Introduction to Agentic AI]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2400873/c1e-0xr3of7j28qcgm3gn-47o553koig19-xjkcyv.mp3" length="3275764"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Agentic AI, focussing on Introduction to Agentic AI]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Insecure Deserialization]]>
                </title>
                <pubDate>Thu, 12 Mar 2026 14:33:33 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2392044</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-insecure-deserialization</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Insecure Deserialization, focussing on introduction to insecure deserialization]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Insecure Deserialization, focussing on introduction to insecure deserialization]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Insecure Deserialization]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Insecure Deserialization, focussing on introduction to insecure deserialization]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2392044/c1e-rnwx9sojp5qh2k44g-mkg53d8mcj53-m2cysf.mp3" length="2887061"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Insecure Deserialization, focussing on introduction to insecure deserialization]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is a Zero Click Attack]]>
                </title>
                <pubDate>Thu, 05 Mar 2026 14:33:27 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2383579</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-a-zero-click-attack</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Zero click attack, focussing on zero click attack]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Zero click attack, focussing on zero click attack]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is a Zero Click Attack]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Zero click attack, focussing on zero click attack]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2383579/c1e-23gr9aq1702f67zzm-9jwxr549ujk7-rtpgkj.mp3" length="2757912"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Zero click attack, focussing on zero click attack]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is a Dependency Confusion Attack]]>
                </title>
                <pubDate>Thu, 26 Feb 2026 14:32:05 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2374621</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-a-dependency-confusion-attack</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Dependency Confusion Attacks, focussing on dependency confusion overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Dependency Confusion Attacks, focussing on dependency confusion overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is a Dependency Confusion Attack]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Dependency Confusion Attacks, focussing on dependency confusion overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2374621/c1e-39z0raw0o8gakqzz6-rk2jg2vphz9m-r5jj6o.mp3" length="2495016"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Dependency Confusion Attacks, focussing on dependency confusion overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Threat Modeling]]>
                </title>
                <pubDate>Thu, 19 Feb 2026 14:32:26 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2367911</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-threat-modeling</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Threat Modeling in Cybersecurity, focussing on threat modeling overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Threat Modeling in Cybersecurity, focussing on threat modeling overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Threat Modeling]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Threat Modeling in Cybersecurity, focussing on threat modeling overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2367911/c1e-8g6z1ivqoj5f1dgg4-34xvvq8gt2o7-d3dtwu.mp3" length="2940143"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Threat Modeling in Cybersecurity, focussing on threat modeling overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is a Hardware Security Module  HSM]]>
                </title>
                <pubDate>Thu, 12 Feb 2026 14:32:25 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2360733</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-a-hardware-security-module-hsm</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Hardware Security Modules  HSMs , focussing on introduction to hsms]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Hardware Security Modules  HSMs , focussing on introduction to hsms]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is a Hardware Security Module  HSM]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Hardware Security Modules  HSMs , focussing on introduction to hsms]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2360733/c1e-rnwx9son3k1t2k44n-jpqp659jc8z1-urgmg2.mp3" length="2686024"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Hardware Security Modules  HSMs , focussing on introduction to hsms]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Evil Twin WiFi]]>
                </title>
                <pubDate>Thu, 22 Jan 2026 14:34:33 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2334010</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-evil-twin-wifi</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  evil twin WiFi, focussing on evil twin WiFi overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  evil twin WiFi, focussing on evil twin WiFi overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Evil Twin WiFi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  evil twin WiFi, focussing on evil twin WiFi overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2334010/c1e-rnwx9sop5n2h2kw25-z34kkmdobjjo-zopu0j.mp3" length="2709431"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  evil twin WiFi, focussing on evil twin WiFi overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Multiple Platforms  CyberGuard Highlights  Breaches & Patches]]>
                </title>
                <pubDate>Mon, 19 Jan 2026 14:34:54 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2329598</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/multiple-platforms-cyberguard-highlights-breaches-patches</link>
                                <description>
                                            <![CDATA[Today s briefing spans Betterment s social engineering breach and crypto scams, Google s patched Fast Pair Bluetooth, browser, Windows and AI prompt injection flaws, RedVDS phishing takedown, plus Instagram password reset and Telegram IP proxy bugs.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Today s briefing spans Betterment s social engineering breach and crypto scams, Google s patched Fast Pair Bluetooth, browser, Windows and AI prompt injection flaws, RedVDS phishing takedown, plus Instagram password reset and Telegram IP proxy bugs.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Multiple Platforms  CyberGuard Highlights  Breaches & Patches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Today s briefing spans Betterment s social engineering breach and crypto scams, Google s patched Fast Pair Bluetooth, browser, Windows and AI prompt injection flaws, RedVDS phishing takedown, plus Instagram password reset and Telegram IP proxy bugs.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2329598/c1e-vjnrmc56qxgswz1wj-1prkp6k7iow6-059ajr.mp3" length="6865198"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Today s briefing spans Betterment s social engineering breach and crypto scams, Google s patched Fast Pair Bluetooth, browser, Windows and AI prompt injection flaws, RedVDS phishing takedown, plus Instagram password reset and Telegram IP proxy bugs.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Browser in the Browser Phishing]]>
                </title>
                <pubDate>Thu, 15 Jan 2026 14:33:37 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2325536</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-browser-in-the-browser-phishing</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  browser in the browser phishing, focussing on browser in the browser phishing overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  browser in the browser phishing, focussing on browser in the browser phishing overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Browser in the Browser Phishing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  browser in the browser phishing, focussing on browser in the browser phishing overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2325536/c1e-7mq1guv54mrsd6vdr-kpjw5g2dtg4g-kbpjtq.mp3" length="2805146"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  browser in the browser phishing, focussing on browser in the browser phishing overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Instagram API  Insta Leak to Ledger Breach &  26M DeFi Heist]]>
                </title>
                <pubDate>Mon, 12 Jan 2026 14:35:30 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2320084</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/instagram-api-insta-leak-to-ledger-breach-26m-defi-heist</link>
                                <description>
                                            <![CDATA[We unpack an old Instagram API bug that leaked 17M accounts, Telegram s new Detector404 AI for scam detection, Microsoft s anti spoofing policies with mandatory MFA, the Ledger Global e breach fueling crypto phishing, and Truebit s  26M DeFi exploit.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We unpack an old Instagram API bug that leaked 17M accounts, Telegram s new Detector404 AI for scam detection, Microsoft s anti spoofing policies with mandatory MFA, the Ledger Global e breach fueling crypto phishing, and Truebit s  26M DeFi exploit.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Instagram API  Insta Leak to Ledger Breach &  26M DeFi Heist]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[We unpack an old Instagram API bug that leaked 17M accounts, Telegram s new Detector404 AI for scam detection, Microsoft s anti spoofing policies with mandatory MFA, the Ledger Global e breach fueling crypto phishing, and Truebit s  26M DeFi exploit.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2320084/c1e-kkmzvago524a9419n-xx78684nbdw-smluzl.mp3" length="10863907"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We unpack an old Instagram API bug that leaked 17M accounts, Telegram s new Detector404 AI for scam detection, Microsoft s anti spoofing policies with mandatory MFA, the Ledger Global e breach fueling crypto phishing, and Truebit s  26M DeFi exploit.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:11:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Anomaly Detection in Cybersecurity]]>
                </title>
                <pubDate>Thu, 08 Jan 2026 14:33:49 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2317737</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-anomaly-detection-in-cybersecurity</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  anomaly detection, focussing on overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  anomaly detection, focussing on overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Anomaly Detection in Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  anomaly detection, focussing on overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2317737/c1e-4rvn0t1p6rjtopgo4-47og31gpbr2-xewtur.mp3" length="2869094"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  anomaly detection, focussing on overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Apple WebKit  WebKit Zero Days & Crypto Wallet Breaches]]>
                </title>
                <pubDate>Mon, 05 Jan 2026 14:35:02 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2313584</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/apple-webkit-webkit-zero-days-crypto-wallet-breaches</link>
                                <description>
                                            <![CDATA[This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over  100K.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over  100K.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Apple WebKit  WebKit Zero Days & Crypto Wallet Breaches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over  100K.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2313584/c1e-zw5g8c7q9p9iokro4-25mgv8nxf9gr-hymk34.mp3" length="9781811"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over  100K.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:10:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Adaptive Multi Factor Authentication Explained]]>
                </title>
                <pubDate>Thu, 01 Jan 2026 14:33:04 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2310625</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/adaptive-multi-factor-authentication-explained</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Adaptive Multi Factor Authentication Explained]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2310625/c1e-9148zudkqm3udv6d9-9j3k8wkxfj4k-edcqo1.mp3" length="2575686"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Stealka Malware  Cyber Threat Roundup  From Stealka to Trust Wallet]]>
                </title>
                <pubDate>Mon, 29 Dec 2025 14:34:58 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2307554</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/stealka-malware-cyber-threat-roundup-from-stealka-to-trust-wallet</link>
                                <description>
                                            <![CDATA[Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Stealka Malware  Cyber Threat Roundup  From Stealka to Trust Wallet]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2307554/c1e-zw5g8c7008giokrom-5zdpv9xztp1d-odicng.mp3" length="9645974"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:10:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Homomorphic Encryption]]>
                </title>
                <pubDate>Thu, 25 Dec 2025 14:33:18 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2304887</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-homomorphic-encryption</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  homomorphic encryption, focussing on homomorphic encryption overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  homomorphic encryption, focussing on homomorphic encryption overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Homomorphic Encryption]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  homomorphic encryption, focussing on homomorphic encryption overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2304887/c1e-4rvn0t1qo3ptopgoz-8do5kp60b8q5-rbzrpj.mp3" length="2930535"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  homomorphic encryption, focussing on homomorphic encryption overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cisco AsyncOS SEG  Cisco AsyncOS SEG Zero Day & Cyber News Roundup]]>
                </title>
                <pubDate>Mon, 22 Dec 2025 14:34:35 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2301841</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cisco-asyncos-seg-cisco-asyncos-seg-zero-day-cyber-news-roundup</link>
                                <description>
                                            <![CDATA[Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered  Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered  Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cisco AsyncOS SEG  Cisco AsyncOS SEG Zero Day & Cyber News Roundup]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered  Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2301841/c1e-mo8v5tqx8qkfwqkw7-qdv8w5wxinm-rzavzi.mp3" length="6174316"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered  Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:06:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is an Extension Supply Chain Attack]]>
                </title>
                <pubDate>Thu, 18 Dec 2025 14:34:11 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2295156</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-an-extension-supply-chain-attack</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  extension supply chain attack, focussing on overview of extension supply chain attacks]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  extension supply chain attack, focussing on overview of extension supply chain attacks]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is an Extension Supply Chain Attack]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  extension supply chain attack, focussing on overview of extension supply chain attacks]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2295156/c1e-vjnrmc736zqawz1w5-pkvpjpjru1pd-jtqyp0.mp3" length="3242751"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  extension supply chain attack, focussing on overview of extension supply chain attacks]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Apple OS Platforms  Critical Apple Patches Binance Hijack & Linux CVEs]]>
                </title>
                <pubDate>Mon, 15 Dec 2025 14:36:56 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2289247</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/apple-os-platforms-critical-apple-patches-binance-hijack-linux-cves</link>
                                <description>
                                            <![CDATA[Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Apple OS Platforms  Critical Apple Patches Binance Hijack & Linux CVEs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2289247/c1e-505mnf19p07s0xm01-gp98jkd5irmr-o6dvrq.mp3" length="7319942"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Attack Surface Discovery]]>
                </title>
                <pubDate>Thu, 11 Dec 2025 14:34:03 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2284504</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-attack-surface-discovery</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Attack surface discovery, focussing on introduction attack surface]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Attack surface discovery, focussing on introduction attack surface]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Attack Surface Discovery]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Attack surface discovery, focussing on introduction attack surface]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2284504/c1e-gv4ngtm2mwdh2466j-34m0xggdsw8k-altorl.mp3" length="2393457"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Attack surface discovery, focussing on introduction attack surface]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[React Framework  29.7Tbps DDoS, React RCE Outages & Ubuntu Fixes]]>
                </title>
                <pubDate>Mon, 08 Dec 2025 14:34:50 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2275321</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/react-framework-297tbps-ddos-react-rce-outages-ubuntu-fixes</link>
                                <description>
                                            <![CDATA[Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[React Framework  29.7Tbps DDoS, React RCE Outages & Ubuntu Fixes]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2275321/c1e-o975xa2kovwa8n08k-wwp294xmsrk-wihgqc.mp3" length="7013159"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Deception Technology]]>
                </title>
                <pubDate>Thu, 04 Dec 2025 14:33:47 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2267372</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-deception-technology</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Deception Technology, focussing on introduction to deception technology]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Deception Technology, focussing on introduction to deception technology]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Deception Technology]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Deception Technology, focussing on introduction to deception technology]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2267372/c1e-39z0rak4r24skq0k1-wwp3j4z9b3n2-jihwkh.mp3" length="3581715"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Deception Technology, focussing on introduction to deception technology]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Multiple Platforms  Rapid Fire Cybersecurity Briefing]]>
                </title>
                <pubDate>Mon, 01 Dec 2025 14:35:59 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2261361</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/multiple-platforms-rapid-fire-cybersecurity-briefing</link>
                                <description>
                                            <![CDATA[Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s  30M Solana wallet breach.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s  30M Solana wallet breach.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Multiple Platforms  Rapid Fire Cybersecurity Briefing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s  30M Solana wallet breach.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2261361/c1e-9148zud7gk6idv6d9-kpn86qnmurjk-hhv89k.mp3" length="9009794"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s  30M Solana wallet breach.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to the MITRE ATT&CK Framework]]>
                </title>
                <pubDate>Thu, 27 Nov 2025 14:35:28 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2248155</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-the-mitre-attck-framework</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  MITRE ATT&amp;CK Framework, focussing on framework overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  MITRE ATT&CK Framework, focussing on framework overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to the MITRE ATT&CK Framework]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  MITRE ATT&amp;CK Framework, focussing on framework overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2248155/c1e-q0jk3fdm8npa0v33j-kpnq8q96uwmw-wwlh9v.mp3" length="2221676"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  MITRE ATT&CK Framework, focussing on framework overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Linux Kernel  AI Espionage, Critical Kernel Vulns & Telegram]]>
                </title>
                <pubDate>Mon, 17 Nov 2025 14:35:30 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2222623</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/linux-kernel-ai-espionage-critical-kernel-vulns-telegram</link>
                                <description>
                                            <![CDATA[Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group  Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers  Telegram scrambles to contain malware bots, data leaks and fake update scams.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group  Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers  Telegram scrambles to contain malware bots, data leaks and fake update scams.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Linux Kernel  AI Espionage, Critical Kernel Vulns & Telegram]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group  Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers  Telegram scrambles to contain malware bots, data leaks and fake update scams.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2222623/c1e-wjg02c3gwpvu0gm0n-5zd4gkomtxpd-eklan8.mp3" length="7806029"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group  Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers  Telegram scrambles to contain malware bots, data leaks and fake update scams.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Shadow AI]]>
                </title>
                <pubDate>Thu, 13 Nov 2025 14:34:17 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2208242</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-shadow-ai</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Shadow AI, focussing on shadow ai overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Shadow AI, focussing on shadow ai overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Shadow AI]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Shadow AI, focussing on shadow ai overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2208242/c1e-8g6z1io2g4kc1d81z-wwpwgmm0fdw6-dct5k2.mp3" length="3161666"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Shadow AI, focussing on shadow ai overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Balancer batch swap  DeFi Rounding Bug Drains  128M  Cisco Patches, AI]]>
                </title>
                <pubDate>Mon, 10 Nov 2025 14:34:43 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2201603</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/balancer-batch-swap-defi-rounding-bug-drains-128m-cisco-patches-ai</link>
                                <description>
                                            <![CDATA[This episode dissects Balancer v2 s  116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode dissects Balancer v2 s  116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Balancer batch swap  DeFi Rounding Bug Drains  128M  Cisco Patches, AI]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode dissects Balancer v2 s  116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2201603/c1e-1on93t565jocxv9xg-8dodq8wxtoo8-9bgu1s.mp3" length="4452698"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode dissects Balancer v2 s  116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:04:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to Active Directory Security]]>
                </title>
                <pubDate>Thu, 06 Nov 2025 14:35:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2197168</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-active-directory-security</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Active Directory security, focussing on active directory security fundamentals]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Active Directory security, focussing on active directory security fundamentals]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to Active Directory Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Active Directory security, focussing on active directory security fundamentals]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2197168/c1e-mo8v5tq7x8ptwqppg-okj8m0jmtj03-xh3tog.mp3" length="3099389"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Active Directory security, focussing on active directory security fundamentals]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[VMware Tools  CISA Urgent Patch for VMware Tools Zero Day]]>
                </title>
                <pubDate>Mon, 03 Nov 2025 14:37:43 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2183489</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/vmware-tools-cisa-urgent-patch-for-vmware-tools-zero-day</link>
                                <description>
                                            <![CDATA[CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[VMware Tools  CISA Urgent Patch for VMware Tools Zero Day]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2183489/c1e-39z0rakgzombkq0k1-wwp4nrj7u3dk-0efnby.mp3" length="12337632"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:12:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why classical crypto fails against quantum attacks]]>
                </title>
                <pubDate>Thu, 30 Oct 2025 14:34:10 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2176103</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/why-classical-crypto-fails-against-quantum-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threat]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threat]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Why classical crypto fails against quantum attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threat]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2176103/c1e-prd7ot1dov7umo9mr-wwp74rmjcd2z-hdm6zr.mp3" length="2734094"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threat]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[WatchGuard Fireware  WatchGuard Fireware VPN RCE Bug]]>
                </title>
                <pubDate>Wed, 29 Oct 2025 22:50:34 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2175522</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/watchguard-fireware-watchguard-fireware-vpn-rce-bug</link>
                                <description>
                                            <![CDATA[An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[WatchGuard Fireware  WatchGuard Fireware VPN RCE Bug]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2175522/c1e-7mq1gu9xro1id6vdr-34mxd9p9ak2j-uvxho6.mp3" length="9589087"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:10:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to BGP and Internet Routing]]>
                </title>
                <pubDate>Thu, 23 Oct 2025 14:33:50 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2170542</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-bgp-and-internet-routing</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  BGP hijacking, focussing on bgp basics]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  BGP hijacking, focussing on bgp basics]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to BGP and Internet Routing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  BGP hijacking, focussing on bgp basics]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2170542/c1e-4rvn0t1d981hop667-8doqv243uxo9-mlw2iv.mp3" length="2825209"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  BGP hijacking, focussing on bgp basics]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cisco SNMP  Zero Disco  Cisco SNMP Rootkit Exploit]]>
                </title>
                <pubDate>Mon, 20 Oct 2025 14:35:57 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2168574</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cisco-snmp-zero-disco-cisco-snmp-rootkit-exploit</link>
                                <description>
                                            <![CDATA[A deep dive into Cisco s critical SNMP  Zero Disco  flaw  CVE 2025 20352  used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new  Pixnapping  timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A deep dive into Cisco s critical SNMP  Zero Disco  flaw  CVE 2025 20352  used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new  Pixnapping  timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cisco SNMP  Zero Disco  Cisco SNMP Rootkit Exploit]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A deep dive into Cisco s critical SNMP  Zero Disco  flaw  CVE 2025 20352  used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new  Pixnapping  timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2168574/c1e-n3p27adqjrdu9z49j-kpn4zdnrtzg6-xvxq2g.mp3" length="7907174"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A deep dive into Cisco s critical SNMP  Zero Disco  flaw  CVE 2025 20352  used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new  Pixnapping  timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Deepfake Social Engineering]]>
                </title>
                <pubDate>Thu, 16 Oct 2025 14:34:35 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2166455</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-deepfake-social-engineering</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  deepfake social engineering, focussing on overview of deepfake social engineering]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  deepfake social engineering, focussing on overview of deepfake social engineering]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Deepfake Social Engineering]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  deepfake social engineering, focussing on overview of deepfake social engineering]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2166455/c1e-gv4ngtm95vqc2492k-dmx4054vf3xv-f4kxqv.mp3" length="3171697"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  deepfake social engineering, focussing on overview of deepfake social engineering]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Discord Zendesk  Discord Zendesk Breach & Google Patches]]>
                </title>
                <pubDate>Mon, 13 Oct 2025 14:35:45 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2164160</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/discord-zendesk-discord-zendesk-breach-google-patches</link>
                                <description>
                                            <![CDATA[Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day  CVE 2025 61882 .]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day  CVE 2025 61882 .]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Discord Zendesk  Discord Zendesk Breach & Google Patches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day  CVE 2025 61882 .]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2164160/c1e-vjnrmc7qd9pfwz1wj-okj3g0j8fwr2-zjaksq.mp3" length="4491985"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day  CVE 2025 61882 .]]>
                </itunes:summary>
                                                                            <itunes:duration>00:04:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Why Quantum Computing Threatens Cryptography]]>
                </title>
                <pubDate>Thu, 09 Oct 2025 14:33:54 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2161478</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/why-quantum-computing-threatens-cryptography</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threats]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threats]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Why Quantum Computing Threatens Cryptography]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threats]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2161478/c1e-xjzn1c96kgqcn755o-kpn20o2zb8r9-6wfoai.mp3" length="2642142"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  quantum safe cryptography, focussing on quantum threats]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cloud & OS Platforms  AI Ransomware Defense, Encryption & Patches]]>
                </title>
                <pubDate>Mon, 06 Oct 2025 14:35:56 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2159055</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cloud-os-platforms-ai-ransomware-defense-encryption-patches</link>
                                <description>
                                            <![CDATA[Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cloud & OS Platforms  AI Ransomware Defense, Encryption & Patches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2159055/c1e-8g6z1ionx82f1d81z-qdvr47v5tv65-x2yd9p.mp3" length="8058894"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Are Non Human Identities  NHIs]]>
                </title>
                <pubDate>Sat, 04 Oct 2025 13:19:24 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2157668</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-non-human-identities-nhis</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Non Human Identities  NHIs , focussing on Introduction to Non Human Identities]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Non Human Identities  NHIs , focussing on Introduction to Non Human Identities]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Are Non Human Identities  NHIs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Non Human Identities  NHIs , focussing on Introduction to Non Human Identities]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2157668/c1e-gv4ngtm9g8ki2492k-347zq0xqbk6-eggenx.mp3" length="3603866"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Non Human Identities  NHIs , focussing on Introduction to Non Human Identities]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What are over permissioned API keys]]>
                </title>
                <pubDate>Thu, 25 Sep 2025 14:34:25 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2149609</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-over-permissioned-api-keys</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Over permissioned API Keys, focussing on over permissioned api keys]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Over permissioned API Keys, focussing on over permissioned api keys]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What are over permissioned API keys]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Over permissioned API Keys, focussing on over permissioned api keys]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2149609/c1e-6nkgmsojjm5hnd99w-v6474x2zf56-88zgmh.mp3" length="2765442"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Over permissioned API Keys, focussing on over permissioned api keys]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[macOS ChillyHell  Backdoors, Zero Clicks, AI Phishing & Kernel Bugs]]>
                </title>
                <pubDate>Mon, 15 Sep 2025 14:36:58 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2141262</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/macos-chillyhell-backdoors-zero-clicks-ai-phishing-kernel-bugs</link>
                                <description>
                                            <![CDATA[This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[macOS ChillyHell  Backdoors, Zero Clicks, AI Phishing & Kernel Bugs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2141262/c1e-dvk90tm3g1mspd4pn-jp35zxkpuoro-wxogrf.mp3" length="12824135"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:13:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Threat Hunting]]>
                </title>
                <pubDate>Thu, 11 Sep 2025 14:34:21 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2138487</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-threat-hunting</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Threat hunting, focussing on threat hunting overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Threat hunting, focussing on threat hunting overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Threat Hunting]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Threat hunting, focussing on threat hunting overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2138487/c1e-dvk90tm3x88hpd4pn-v64r9vz7ijqz-bydvvb.mp3" length="3377332"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Threat hunting, focussing on threat hunting overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Drift OAuth tokens  Supply Chain Breach Exposes OAuth Tokens]]>
                </title>
                <pubDate>Mon, 08 Sep 2025 14:35:52 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2135841</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/drift-oauth-tokens-supply-chain-breach-exposes-oauth-tokens</link>
                                <description>
                                            <![CDATA[Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Drift OAuth tokens  Supply Chain Breach Exposes OAuth Tokens]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2135841/c1e-39z0rakdp32hkq0k1-2549vxm9c0qd-ygaedq.mp3" length="5701603"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:05:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What are fileless threats]]>
                </title>
                <pubDate>Thu, 04 Sep 2025 14:33:46 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2132156</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-fileless-threats</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  fileless threats, focussing on introduction to fileless threats]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  fileless threats, focussing on introduction to fileless threats]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What are fileless threats]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  fileless threats, focussing on introduction to fileless threats]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2132156/c1e-kkmzvagvj0na94775-dm2p986vsrdz-iqhrgx.mp3" length="2716958"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  fileless threats, focussing on introduction to fileless threats]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Anthropic Claude  AI Driven Phishing & RDP to TransUnion Breach]]>
                </title>
                <pubDate>Mon, 01 Sep 2025 14:36:33 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2129179</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/anthropic-claude-ai-driven-phishing-rdp-to-transunion-breach</link>
                                <description>
                                            <![CDATA[Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Anthropic Claude  AI Driven Phishing & RDP to TransUnion Breach]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2129179/c1e-mo8v5tq1wjotwqkw7-6z3xp68zsw6w-fa6sfs.mp3" length="13004321"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:13:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Reverse Engineering]]>
                </title>
                <pubDate>Thu, 28 Aug 2025 14:34:10 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2126709</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-reverse-engineering</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Reverse engineering, focussing on reverse engineering overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Reverse engineering, focussing on reverse engineering overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Reverse Engineering]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Reverse engineering, focussing on reverse engineering overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2126709/c1e-gv4ngtm7kv2a2492k-347o86g9bkwp-g6jp2e.mp3" length="3296249"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Reverse engineering, focussing on reverse engineering overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[ImageIO  Apple ImageIO Zero Click Zero Day Patched]]>
                </title>
                <pubDate>Mon, 25 Aug 2025 14:37:27 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2121766</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/imageio-apple-imageio-zero-click-zero-day-patched</link>
                                <description>
                                            <![CDATA[Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[ImageIO  Apple ImageIO Zero Click Zero Day Patched]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2121766/c1e-505mnf10vp2a0xm08-okz2m3kqcx7x-ruhpfb.mp3" length="10646568"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:11:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Extended Detection and Response  XDR]]>
                </title>
                <pubDate>Thu, 21 Aug 2025 14:35:54 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2116378</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-extended-detection-and-response-xdr</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Extended Detection and Response  XDR , focussing on xdr overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Extended Detection and Response  XDR , focussing on xdr overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Extended Detection and Response  XDR]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Extended Detection and Response  XDR , focussing on xdr overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2116378/c1e-9148zud6wdjhdv6d9-47xpd1m5ikk5-tbapha.mp3" length="3288726"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Extended Detection and Response  XDR , focussing on xdr overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[FortiSIEM  Fortinet RCE & Global Cyber Updates]]>
                </title>
                <pubDate>Mon, 18 Aug 2025 14:37:07 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2114058</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/fortisiem-fortinet-rce-global-cyber-updates</link>
                                <description>
                                            <![CDATA[Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[FortiSIEM  Fortinet RCE & Global Cyber Updates]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2114058/c1e-n3p27ad8n5wi9z49j-9jqvgg2otj70-hbmvxb.mp3" length="11092948"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:11:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What are Living off the Land attacks]]>
                </title>
                <pubDate>Thu, 14 Aug 2025 14:33:52 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2112000</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-living-off-the-land-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Living off the Land  LotL  attacks, focussing on overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Living off the Land  LotL  attacks, focussing on overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What are Living off the Land attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Living off the Land  LotL  attacks, focussing on overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2112000/c1e-wjg02c37wgjs0gm0d-qdo01pr3c4dv-yauetb.mp3" length="2642978"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Living off the Land  LotL  attacks, focussing on overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Gemini AI Calendar  Promptware Attack in Google Calendar]]>
                </title>
                <pubDate>Mon, 11 Aug 2025 14:36:57 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2108434</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/gemini-ai-calendar-promptware-attack-in-google-calendar</link>
                                <description>
                                            <![CDATA[A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Gemini AI Calendar  Promptware Attack in Google Calendar]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2108434/c1e-7mq1gu9r7w8id6vdr-qdodg7xxawvx-kmhepl.mp3" length="7623798"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Behavioral Fingerprinting]]>
                </title>
                <pubDate>Thu, 07 Aug 2025 14:34:05 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2106041</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-behavioral-fingerprinting</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Behavioral Fingerprinting, focussing on introduction]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Behavioral Fingerprinting, focussing on introduction]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Behavioral Fingerprinting]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Behavioral Fingerprinting, focussing on introduction]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2106041/c1e-8g6z1io88vgh1dggr-kp95kqdnsrnx-v8ctro.mp3" length="2396800"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Behavioral Fingerprinting, focussing on introduction]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Aeroflot IT Systems  Aeroflot Breach, CISA Kit, Google & Telegram]]>
                </title>
                <pubDate>Mon, 04 Aug 2025 14:37:14 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2104035</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/aeroflot-it-systems-aeroflot-breach-cisa-kit-google-telegram</link>
                                <description>
                                            <![CDATA[Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Aeroflot IT Systems  Aeroflot Breach, CISA Kit, Google & Telegram]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2104035/c1e-n3p27ad83j1u9z49j-qdop65dwan92-5sbamk.mp3" length="10548721"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:11:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Container Security Fundamentals]]>
                </title>
                <pubDate>Thu, 31 Jul 2025 14:34:37 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2102084</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/container-security-fundamentals</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  container security, focussing on container security fundamentals]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  container security, focussing on container security fundamentals]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Container Security Fundamentals]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  container security, focussing on container security fundamentals]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2102084/c1e-9148zud43jxidv6d9-gpz5mrw0h0np-j3dnbx.mp3" length="3058847"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  container security, focussing on container security fundamentals]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What are LLM jailbreak attacks]]>
                </title>
                <pubDate>Thu, 24 Jul 2025 14:34:23 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2096725</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-llm-jailbreak-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  LLM jailbreak attacks, focussing on LLM jailbreak attacks overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  LLM jailbreak attacks, focussing on LLM jailbreak attacks overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What are LLM jailbreak attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  LLM jailbreak attacks, focussing on LLM jailbreak attacks overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2096725/c1e-wjg02c3vgz8h0gm0d-mkjjz113b43k-uqpsfn.mp3" length="2745379"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  LLM jailbreak attacks, focussing on LLM jailbreak attacks overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[BigONE hot wallet  Supply Chain Heist to Zero Days  Weekly Brief]]>
                </title>
                <pubDate>Mon, 21 Jul 2025 14:36:29 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2094211</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/bigone-hot-wallet-supply-chain-heist-to-zero-daysw3n</link>
                                <description>
                                            <![CDATA[This CyberScene episode unpacks the  27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This CyberScene episode unpacks the  27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[BigONE hot wallet  Supply Chain Heist to Zero Days  Weekly Brief]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This CyberScene episode unpacks the  27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2094211/c1e-gv4ngtmrp1zf2492k-kp992oonsrgw-rfoxqk.mp3" length="9032827"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This CyberScene episode unpacks the  27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is DNS Tunneling]]>
                </title>
                <pubDate>Thu, 17 Jul 2025 14:34:39 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2091607</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-dns-tunneling</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  DNS tunneling, focussing on dns tunneling overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  DNS tunneling, focussing on dns tunneling overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is DNS Tunneling]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  DNS tunneling, focussing on dns tunneling overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2091607/c1e-mo8v5tq44q4fwqkw7-kp9wmow8b3dd-snpp1j.mp3" length="2568164"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  DNS tunneling, focussing on dns tunneling overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[GMX V1  GMX  40M Arbitrum Exploit & Weekly Cyber Brief]]>
                </title>
                <pubDate>Mon, 14 Jul 2025 14:38:07 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2088042</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/gmx-v1-gmx-40m-arbitrum-exploit-weekly-cyber-brihkp</link>
                                <description>
                                            <![CDATA[Highlights include GMX s  40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Highlights include GMX s  40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[GMX V1  GMX  40M Arbitrum Exploit & Weekly Cyber Brief]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Highlights include GMX s  40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2088042/c1e-xjzn1c91rrzhn7wn8-okzwz2n0igz3-6rnppu.mp3" length="12355229"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Highlights include GMX s  40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:12:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Ransomware as a Service]]>
                </title>
                <pubDate>Thu, 10 Jul 2025 14:35:03 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2085495</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-ransomware-as-a-service</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Ransomware as a Service  RaaS , focussing on Ransomware as a Service  RaaS  overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Ransomware as a Service  RaaS , focussing on Ransomware as a Service  RaaS  overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Ransomware as a Service]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Ransomware as a Service  RaaS , focussing on Ransomware as a Service  RaaS  overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2085495/c1e-39z0rakk466hkq0k1-9jq0rmr9bjdq-0m9dyw.mp3" length="3438773"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Ransomware as a Service  RaaS , focussing on Ransomware as a Service  RaaS  overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cisco UCM  Cisco UCM Backdoor, Qantas Breach & Telegram]]>
                </title>
                <pubDate>Mon, 07 Jul 2025 14:36:50 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2082683</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cisco-ucm-cisco-ucm-backdoor-qantas-breach-telegtkg</link>
                                <description>
                                            <![CDATA[Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM  CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM  CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cisco UCM  Cisco UCM Backdoor, Qantas Breach & Telegram]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM  CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2082683/c1e-q0jk3fdd8mxi0v20g-v6410x0zfg4x-ebrinl.mp3" length="9381779"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM  CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What are Side Channel Timing Attacks]]>
                </title>
                <pubDate>Thu, 03 Jul 2025 14:34:18 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2080689</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-are-side-channel-timing-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Side Channel Timing Attack, focussing on side channel timing attacks]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Side Channel Timing Attack, focussing on side channel timing attacks]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What are Side Channel Timing Attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Side Channel Timing Attack, focussing on side channel timing attacks]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2080689/c1e-wjg02c33qvkf0gm0n-v6dnvxzgh2q-szlch1.mp3" length="3134499"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Side Channel Timing Attack, focussing on side channel timing attacks]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Gmail MFA Bypass  Phishing Bypass Exposes Gmail Accounts]]>
                </title>
                <pubDate>Mon, 30 Jun 2025 14:37:06 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2078190</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/gmail-mfa-bypass-phishing-bypass-exposes-gmail-accozss</link>
                                <description>
                                            <![CDATA[A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Gmail MFA Bypass  Phishing Bypass Exposes Gmail Accounts]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2078190/c1e-dvk90tmmo0mapd4pn-47k83195s0jz-9u7d4z.mp3" length="12142026"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:12:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is Attack Surface Management]]>
                </title>
                <pubDate>Thu, 26 Jun 2025 14:34:13 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2076301</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-attack-surface-management</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  attack surface management, focussing on introduction to attack surface management]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  attack surface management, focussing on introduction to attack surface management]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is Attack Surface Management]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  attack surface management, focussing on introduction to attack surface management]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2076301/c1e-505mnf11k3xt0xddz-jpd9gjj7t53p-ymn5fl.mp3" length="2721556"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  attack surface management, focussing on introduction to attack surface management]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[CVE 2025 2783  Chrome Zero Day & Cloud PC Safeguards]]>
                </title>
                <pubDate>Mon, 23 Jun 2025 14:36:47 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2072181</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cve-2025-2783-chrome-zero-day-cloud-pc-safeguards</link>
                                <description>
                                            <![CDATA[This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[CVE 2025 2783  Chrome Zero Day & Cloud PC Safeguards]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2072181/c1e-6nkgmso2xpxhndonv-ndng2rrpa3q3-wkxx2a.mp3" length="11204962"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:11:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding Prompt Injection]]>
                </title>
                <pubDate>Thu, 19 Jun 2025 14:33:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2070061</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/understanding-prompt-injection</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Agentic AI vulnerabilities, focussing on prompt injection]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Agentic AI vulnerabilities, focussing on prompt injection]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Understanding Prompt Injection]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Agentic AI vulnerabilities, focussing on prompt injection]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2070061/c1e-wjg02c3rp08i0gm0d-xxo31kvoi4xj-ykp8uj.mp3" length="3289144"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Agentic AI vulnerabilities, focussing on prompt injection]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Apple iMessage  Apple iMessage Zero Click & OAuth Malware Tricks]]>
                </title>
                <pubDate>Mon, 16 Jun 2025 14:36:28 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2066508</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/apple-imessage-apple-imessage-zero-click-oauth-malware-tricks</link>
                                <description>
                                            <![CDATA[Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Apple iMessage  Apple iMessage Zero Click & OAuth Malware Tricks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2066508/c1e-9148zudnp1mudv6d9-7z3d7083cwx1-eslgdd.mp3" length="12532862"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:13:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is DNS over HTTPS  DoH]]>
                </title>
                <pubDate>Thu, 12 Jun 2025 14:33:20 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2063067</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-dns-over-https-doh</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  DNS over HTTPS  DoH , focussing on introduction to doh]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  DNS over HTTPS  DoH , focussing on introduction to doh]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is DNS over HTTPS  DoH]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  DNS over HTTPS  DoH , focussing on introduction to doh]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2063067/c1e-6nkgmso220windonv-kp4z01m5h3d-qbbihn.mp3" length="2585300"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  DNS over HTTPS  DoH , focussing on introduction to doh]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Coinbase KYC Data  Coinbase Breach, FBI Alerts, Google & More]]>
                </title>
                <pubDate>Mon, 09 Jun 2025 14:39:00 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2060692</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/coinbase-kyc-data-coinbase-breach-fbi-alerts-google-more</link>
                                <description>
                                            <![CDATA[Dissecting Coinbase s 70K user KYC data leak and  400M response, the FBI s latest phishing, botnet  BADBOX 2.0  and ransomware  Play  warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dissecting Coinbase s 70K user KYC data leak and  400M response, the FBI s latest phishing, botnet  BADBOX 2.0  and ransomware  Play  warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Coinbase KYC Data  Coinbase Breach, FBI Alerts, Google & More]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Dissecting Coinbase s 70K user KYC data leak and  400M response, the FBI s latest phishing, botnet  BADBOX 2.0  and ransomware  Play  warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2060692/c1e-wjg02c3r419i0gm0d-xxon8305hk-ot2rn0.mp3" length="15032631"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dissecting Coinbase s 70K user KYC data leak and  400M response, the FBI s latest phishing, botnet  BADBOX 2.0  and ransomware  Play  warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:15:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is SOAR]]>
                </title>
                <pubDate>Thu, 05 Jun 2025 14:34:37 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2058613</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-soar</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Security Orchestration, Automation, and Response  SOAR , focussing on SOAR fundamentals]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Security Orchestration, Automation, and Response  SOAR , focussing on SOAR fundamentals]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is SOAR]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Security Orchestration, Automation, and Response  SOAR , focussing on SOAR fundamentals]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2058613/c1e-zw5g8c78rq1bokrom-34drk6nqfp40-ukeuzm.mp3" length="3951190"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Security Orchestration, Automation, and Response  SOAR , focussing on SOAR fundamentals]]>
                </itunes:summary>
                                                                            <itunes:duration>00:04:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[ASUS routers  ViciousTrap, Debian Patches & Telegram Threats]]>
                </title>
                <pubDate>Mon, 02 Jun 2025 18:22:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2056372</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/asus-routers-vicioustrap-debian-patches-telegram-threats</link>
                                <description>
                                            <![CDATA[This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[ASUS routers  ViciousTrap, Debian Patches & Telegram Threats]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2056372/c1e-kkmzvag46r4u9419p-z3201zx0ix08-w214zl.mp3" length="7582421"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cetus DEX  Cetus DEX  230M Hack & Cyber Highlights]]>
                </title>
                <pubDate>Mon, 26 May 2025 14:33:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2046126</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cetus-dex-cetus-dex-230m-hack-cyber-highlights</link>
                                <description>
                                            <![CDATA[A packed episode covering the  230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A packed episode covering the  230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cetus DEX  Cetus DEX  230M Hack & Cyber Highlights]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A packed episode covering the  230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2046126/c1e-7mq1gu935v9s5jx0-rk4jng03ajn9-qilojn.mp3" length="76531"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A packed episode covering the  230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:00:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is a Zero Knowledge Proof]]>
                </title>
                <pubDate>Thu, 22 May 2025 14:34:09 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2044536</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-a-zero-knowledge-proof</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  zero knowledge proof, focussing on zero knowledge proof basics]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  zero knowledge proof, focussing on zero knowledge proof basics]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is a Zero Knowledge Proof]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  zero knowledge proof, focussing on zero knowledge proof basics]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2044536/c1e-kkmzvagx97mi94775-7z3wz8kzbqk-1t4b0y.mp3" length="2502125"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  zero knowledge proof, focussing on zero knowledge proof basics]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Insider Threats  Insider breach, Android hardening & ransomware]]>
                </title>
                <pubDate>Mon, 19 May 2025 14:36:04 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2042484</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/insider-threats-insider-breach-android-hardening-ransomware</link>
                                <description>
                                            <![CDATA[Explore Coinbase s bribed insider breach and  20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks &amp; Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Explore Coinbase s bribed insider breach and  20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Insider Threats  Insider breach, Android hardening & ransomware]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Explore Coinbase s bribed insider breach and  20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks &amp; Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2042484/c1e-dvk90tmvz04fpd4pn-jpdoz7qdu4n6-35mrfm.mp3" length="7400191"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Explore Coinbase s bribed insider breach and  20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Confidential Computing]]>
                </title>
                <pubDate>Thu, 15 May 2025 14:33:20 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2040526</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-confidential-computing</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  confidential computing, focussing on confidential computing overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  confidential computing, focussing on confidential computing overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Confidential Computing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  confidential computing, focussing on confidential computing overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2040526/c1e-39z0rak08gztkq0k1-47kr3pv4c5vw-3ewrlu.mp3" length="2441103"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  confidential computing, focussing on confidential computing overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cisco SD WAN Manager  Cisco Phishing, LockBit Leak, Telegram Defenses]]>
                </title>
                <pubDate>Mon, 12 May 2025 14:36:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2038706</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cisco-sd-wan-manager-cisco-phishing-lockbit-leak-telegram-defenses</link>
                                <description>
                                            <![CDATA[Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cisco SD WAN Manager  Cisco Phishing, LockBit Leak, Telegram Defenses]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2038706/c1e-o975xa20pmgc8n08r-ndndx8r6iv6r-ergykg.mp3" length="9107180"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cisco IOS XE  Cisco Patches, LockBit Leak & Telegram Scams]]>
                </title>
                <pubDate>Mon, 12 May 2025 07:02:32 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2038510</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/cisco-ios-xe-cisco-patches-lockbit-leak-telegram-scams</link>
                                <description>
                                            <![CDATA[Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing  60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing  60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Cisco IOS XE  Cisco Patches, LockBit Leak & Telegram Scams]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing  60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2038510/c1e-n3p27ad1v9ni9z49j-7z3zgp48amnd-mgmkgh.mp3" length="7923891"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing  60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is an SBOM]]>
                </title>
                <pubDate>Thu, 08 May 2025 14:33:38 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2027345</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-an-sbom</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  SBOM, focussing on introduction to sbom]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  SBOM, focussing on introduction to sbom]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is an SBOM]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  SBOM, focussing on introduction to sbom]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2027345/c1e-jv018t50ropcn166z-okm85v43fnz6-35hk2m.mp3" length="2253440"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  SBOM, focussing on introduction to sbom]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AirPlay Protocol  AirBorne  Apple s 23 AirPlay Vulnerabilities Exposed]]>
                </title>
                <pubDate>Mon, 05 May 2025 19:07:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2025581</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/airplay-protocol-airborne-apple-s-23-airplay-vulnerabilities-exposed</link>
                                <description>
                                            <![CDATA[Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[AirPlay Protocol  AirBorne  Apple s 23 AirPlay Vulnerabilities Exposed]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2025581/c1e-6nkgmsozp62ando70-wwxnzpr8cdxv-vjp7id.mp3" length="5733120"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:05:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AirPlay Devices  AirBorne AirPlay Flaws, Spyware & Ransomware]]>
                </title>
                <pubDate>Mon, 05 May 2025 18:33:54 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2025556</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/airplay-devices-airborne-airplay-flaws-spyware-ransomware</link>
                                <description>
                                            <![CDATA[A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[AirPlay Devices  AirBorne AirPlay Flaws, Spyware & Ransomware]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2025556/c1e-jv018t50kv2an1kj9-pk489g93t8np-kx0g0r.mp3" length="5824128"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:06:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AirPlay  AirBorne zero click RCE bugs]]>
                </title>
                <pubDate>Mon, 05 May 2025 18:24:40 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2025545</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/airplay-airborne-zero-click-rce-bugs</link>
                                <description>
                                            <![CDATA[Oligo discovered 23  zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Oligo discovered 23  zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[AirPlay  AirBorne zero click RCE bugs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Oligo discovered 23  zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2025545/c1e-prd7ot18qd6imo9p0-7z3n4kkjtx4d-ctjn94.mp3" length="7154048"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Oligo discovered 23  zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[AirPlay SDK  AirBorne  Wormable Zero Click RCE in AirPlay]]>
                </title>
                <pubDate>Mon, 05 May 2025 14:34:36 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2025315</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/airplay-sdk-airborne-wormable-zero-click-rce-in-airplay</link>
                                <description>
                                            <![CDATA[Podcast covers Apple s Pegasus alerts, critical AirPlay  AirBorne  zero click RCE, Telegram anti spam and phishing defenses, TikTok s  530M GDPR fine, and the Co op s data breach plus key mitigation steps.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Podcast covers Apple s Pegasus alerts, critical AirPlay  AirBorne  zero click RCE, Telegram anti spam and phishing defenses, TikTok s  530M GDPR fine, and the Co op s data breach plus key mitigation steps.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[AirPlay SDK  AirBorne  Wormable Zero Click RCE in AirPlay]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Podcast covers Apple s Pegasus alerts, critical AirPlay  AirBorne  zero click RCE, Telegram anti spam and phishing defenses, TikTok s  530M GDPR fine, and the Co op s data breach plus key mitigation steps.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2025315/c1e-1on93t5g8w3ixv9gj-kp4omdw3iqgq-4zlcss.mp3" length="6383232"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Podcast covers Apple s Pegasus alerts, critical AirPlay  AirBorne  zero click RCE, Telegram anti spam and phishing defenses, TikTok s  530M GDPR fine, and the Co op s data breach plus key mitigation steps.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:06:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to Shift Left Security]]>
                </title>
                <pubDate>Thu, 01 May 2025 14:35:50 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2023124</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-shift-left-security</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Shift Left, focussing on shift left security overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Shift Left, focussing on shift left security overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to Shift Left Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Shift Left, focussing on shift left security overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2023124/c1e-kkmzvagr88nu941po-34dx2gmwi59x-csfvg0.mp3" length="2043648"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Shift Left, focussing on shift left security overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Multiple Products  Weekly Cybersecurity Headlines Deep Dive]]>
                </title>
                <pubDate>Mon, 28 Apr 2025 14:35:34 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2021369</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/multiple-products-weekly-cybersecurity-headlines-deep-dive</link>
                                <description>
                                            <![CDATA[This episode covers the FBI s  10M Salt Typhoon hunt and a record breaking  16.6B in internet crime losses  Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF  Telegram s encryption upgrades  and urgent Ubuntu kernel and package patches.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This episode covers the FBI s  10M Salt Typhoon hunt and a record breaking  16.6B in internet crime losses  Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF  Telegram s encryption upgrades  and urgent Ubuntu kernel and package patches.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Multiple Products  Weekly Cybersecurity Headlines Deep Dive]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[This episode covers the FBI s  10M Salt Typhoon hunt and a record breaking  16.6B in internet crime losses  Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF  Telegram s encryption upgrades  and urgent Ubuntu kernel and package patches.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2021369/c1e-39z0rakx5wmckq0j7-okmpm0zgs11v-kl6f8c.mp3" length="8932224"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This episode covers the FBI s  10M Salt Typhoon hunt and a record breaking  16.6B in internet crime losses  Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF  Telegram s encryption upgrades  and urgent Ubuntu kernel and package patches.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Is an Attack Graph]]>
                </title>
                <pubDate>Thu, 24 Apr 2025 18:34:11 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2019541</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-an-attack-graph</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  attack graphs, focussing on attack graphs overview]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  attack graphs, focussing on attack graphs overview]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Is an Attack Graph]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  attack graphs, focussing on attack graphs overview]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2019541/c1e-kkmzvagrrx7h941po-ndnvnj43cxpv-rk2s71.mp3" length="3009408"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  attack graphs, focussing on attack graphs overview]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Prompt Injection]]>
                </title>
                <pubDate>Thu, 24 Apr 2025 08:33:32 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2019206</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-prompt-injection</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  LLM vulnerabilities, focussing on prompt injection]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  LLM vulnerabilities, focussing on prompt injection]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Prompt Injection]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  LLM vulnerabilities, focussing on prompt injection]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2019206/c1e-gv4ngtmxg6jt249nq-z32pzgnra24p-vvq2pg.mp3" length="3404928"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  LLM vulnerabilities, focussing on prompt injection]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KiloEx Oracle   7M KiloEx Cross Chain Oracle Exploit]]>
                </title>
                <pubDate>Mon, 21 Apr 2025 18:34:57 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2017160</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/kiloex-oracle-7m-kiloex-cross-chain-oracle-exploit</link>
                                <description>
                                            <![CDATA[A flawed access control in KiloEx s cross chain price oracle let attackers drain  7M across BNB Chain, Base and Taiko, forcing emergency patches and a  750K bounty to retrieve stolen funds.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A flawed access control in KiloEx s cross chain price oracle let attackers drain  7M across BNB Chain, Base and Taiko, forcing emergency patches and a  750K bounty to retrieve stolen funds.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KiloEx Oracle   7M KiloEx Cross Chain Oracle Exploit]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[A flawed access control in KiloEx s cross chain price oracle let attackers drain  7M across BNB Chain, Base and Taiko, forcing emergency patches and a  750K bounty to retrieve stolen funds.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2017160/c1e-8g6z1iorj78f1d8zj-7z39no3zu2mx-twbmh6.mp3" length="8657664"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A flawed access control in KiloEx s cross chain price oracle let attackers drain  7M across BNB Chain, Base and Taiko, forcing emergency patches and a  750K bounty to retrieve stolen funds.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KiloEx oracle  KiloEx  7M cross chain hack & recovery]]>
                </title>
                <pubDate>Mon, 21 Apr 2025 08:34:00 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2016661</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/kiloex-oracle-kiloex-7m-cross-chain-hack-recovery</link>
                                <description>
                                            <![CDATA[Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s  7M cross chain oracle exploit &amp; full recovery, and MITRE s CVE funding lifeline.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s  7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KiloEx oracle  KiloEx  7M cross chain hack & recovery]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s  7M cross chain oracle exploit &amp; full recovery, and MITRE s CVE funding lifeline.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2016661/c1e-dvk90tmrgvnfpd46q-kp49nm1maw73-zxnmpa.mp3" length="7416576"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s  7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:07:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What is Threat Research Automation]]>
                </title>
                <pubDate>Thu, 17 Apr 2025 09:03:41 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2014902</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/what-is-threat-research-automation</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  threat research automation, focussing on cybersecurity automation]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  threat research automation, focussing on cybersecurity automation]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What is Threat Research Automation]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  threat research automation, focussing on cybersecurity automation]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2014902/c1e-dvk90tmrd7mc3krzq-8drrowjou95d-mdsv5i.mp3" length="5104800"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  threat research automation, focussing on cybersecurity automation]]>
                </itunes:summary>
                                                                            <itunes:duration>00:04:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[iOS, Android, Windows  Vulnerabilities in Big Tech Security Updates]]>
                </title>
                <pubDate>Mon, 14 Apr 2025 09:04:02 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2012688</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/ios-android-windows-vulnerabilities-in-big-tech-security-updates</link>
                                <description>
                                            <![CDATA[Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[iOS, Android, Windows  Vulnerabilities in Big Tech Security Updates]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2012688/c1e-o975xa2wo2rhj35pz-ndno3j74cdr6-soscu8.mp3" length="10358880"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to Lateral Movement Attacks]]>
                </title>
                <pubDate>Thu, 10 Apr 2025 09:03:51 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2010823</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-lateral-movement-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  lateral movement attacks, focussing on lateral movement attacks]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  lateral movement attacks, focussing on lateral movement attacks]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to Lateral Movement Attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  lateral movement attacks, focussing on lateral movement attacks]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2010823/c1e-39z0rak3qrwamv4x7-kp4dp568sv02-llht3x.mp3" length="4244640"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  lateral movement attacks, focussing on lateral movement attacks]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Google Chrome  Tech Giants vs. Cyber Threats  A Dynamic Battle]]>
                </title>
                <pubDate>Mon, 07 Apr 2025 09:04:52 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2007732</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/google-chrome-tech-giants-vs-cyber-threats-a-dynamic-battle</link>
                                <description>
                                            <![CDATA[Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Google Chrome  Tech Giants vs. Cyber Threats  A Dynamic Battle]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2007732/c1e-q0jk3fdn28ji7m9o4-25ndwwv7h600-i9jsa2.mp3" length="9825600"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding Heap Based Overflow]]>
                </title>
                <pubDate>Thu, 03 Apr 2025 09:03:27 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2005997</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/understanding-heap-based-overflow</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  heap based overflow vulnerability, focussing on heap based overflow vulnerability]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  heap based overflow vulnerability, focussing on heap based overflow vulnerability]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Understanding Heap Based Overflow]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  heap based overflow vulnerability, focussing on heap based overflow vulnerability]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2005997/c1e-xjzn1c9rdomir2d16-kpwmq888cgd2-pyisvf.mp3" length="4350240"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  heap based overflow vulnerability, focussing on heap based overflow vulnerability]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Google Chrome  Exploring Zero Day Vulnerabilities in Chrome]]>
                </title>
                <pubDate>Mon, 31 Mar 2025 09:03:51 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2004204</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/google-chrome-exploring-zero-day-vulnerabilities-in-chrome</link>
                                <description>
                                            <![CDATA[The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Google Chrome  Exploring Zero Day Vulnerabilities in Chrome]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2004204/c1e-o975xa2r655hj35pz-6z1p2vjxs82k-acqyqz.mp3" length="8340960"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:06:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to Steganographic Malware]]>
                </title>
                <pubDate>Thu, 27 Mar 2025 09:03:35 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/2000836</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-steganographic-malware</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  Steganographic malware, focussing on steganographic malware]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  Steganographic malware, focussing on steganographic malware]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to Steganographic Malware]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  Steganographic malware, focussing on steganographic malware]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/2000836/c1e-505mnf1rq3kir94ko-okwg51q7fvgp-bm7bqg.mp3" length="5116320"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  Steganographic malware, focussing on steganographic malware]]>
                </itunes:summary>
                                                                            <itunes:duration>00:04:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Apple OS  Apple's Security Scrutiny Unveiled]]>
                </title>
                <pubDate>Mon, 24 Mar 2025 09:03:50 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/1998390</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/apple-os-apples-security-scrutiny-unveiled</link>
                                <description>
                                            <![CDATA[Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Apple OS  Apple's Security Scrutiny Unveiled]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/1998390/c1e-kkmzvagm7vgu2w83o-34n1znjocw74-fvuauv.mp3" length="10459200"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Understanding Adversarial Input]]>
                </title>
                <pubDate>Thu, 20 Mar 2025 09:03:12 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/1996551</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/understanding-adversarial-input</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  adversarial input, focussing on adversarial input]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  adversarial input, focussing on adversarial input]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Understanding Adversarial Input]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  adversarial input, focussing on adversarial input]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/1996551/c1e-xjzn1c953mobr2d16-ww6ov6rgs7k2-kkldbb.mp3" length="3583680"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  adversarial input, focussing on adversarial input]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Apple Products  Apple's Security Overhaul Strategies]]>
                </title>
                <pubDate>Mon, 17 Mar 2025 09:05:34 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/1994150</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/apple-products-apples-security-overhaul-strategies</link>
                                <description>
                                            <![CDATA[Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Apple Products  Apple's Security Overhaul Strategies]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/1994150/c1e-q0jk3fdodn9h7m9o4-jp2mdkmws2nq-k03j02.mp3" length="10879680"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:09:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Introduction to Hypervolumetric DDoS Attacks]]>
                </title>
                <pubDate>Thu, 13 Mar 2025 09:03:47 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/1992073</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/introduction-to-hypervolumetric-ddos-attacks</link>
                                <description>
                                            <![CDATA[An overview of cybersecurity  hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An overview of cybersecurity  hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Introduction to Hypervolumetric DDoS Attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[An overview of cybersecurity  hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/1992073/c1e-505mnf1rzvncr94ko-ndoxoj63bqxk-gdcvsr.mp3" length="4282560"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An overview of cybersecurity  hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks]]>
                </itunes:summary>
                                                                            <itunes:duration>00:03:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bybit  Massive Crypto Breach at Bybit]]>
                </title>
                <pubDate>Mon, 10 Mar 2025 09:05:02 +0000</pubDate>
                <dc:creator>The Daily Dive</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/54639/episode/1990156</guid>
                                    <link>https://cybersecurity-news.castos.com/episodes/bybit-massive-crypto-breach-at-bybit</link>
                                <description>
                                            <![CDATA[Bybit, a major crypto trading platform, suffered a historic  1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Bybit, a major crypto trading platform, suffered a historic  1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Bybit  Massive Crypto Breach at Bybit]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Bybit, a major crypto trading platform, suffered a historic  1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/6485957f09ee91-41670518/1990156/c1e-kkmzvajoox4i2w83o-47dn4w5wa7oo-vuuunj.mp3" length="10400640"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Bybit, a major crypto trading platform, suffered a historic  1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:08:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[The Daily Dive]]>
                </itunes:author>
                            </item>
            </channel>
</rss>
