

Cybersecurity Today
Jim Love
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Episodes
Mentioned books

Sep 19, 2025 • 8min
Cybersecurity Today - The Good News Edition
In this uplifting edition, listeners hear about Microsoft's successful dismantling of a notorious phishing operation. A Texas county triumphantly recovers nearly $2 million lost to a business email scam. Additionally, the Commonwealth Bank of Australia showcases impressive reductions in scam losses thanks to AI technology. The host shares valuable lessons learned in cybersecurity, highlighting recent positive developments that inspire hope in the battle against cyber threats.

Sep 17, 2025 • 9min
Shai-Hulud Worm - A Self Propagating Supply Chain Threat
Discover the alarming rise of the 'Shai-Hulud' worm, which compromises over 187 JavaScript libraries by exploiting developer tokens. Delve into the clever use of steganography, where malicious commands hide in plain sight within harmless images. Learn about a significant cyber incident in Yellowknife that crippled municipal services, highlighting the struggles of local governments with cyber defenses. Lastly, uncover new vulnerabilities introduced by a Windows 11 patch, reminding system admins of the urgent need for vigilant updates.

Sep 15, 2025 • 9min
NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley
Recent discussions reveal a massive NPM attack that exposed critical vulnerabilities in the software supply chain, yet hackers came away with little. A new phishing service, Void Proxy, poses a sophisticated threat to major accounts on Microsoft and Google. The fallout from cyber attacks on companies like Jaguar Land Rover highlights severe impacts on supply chains and leadership changes at businesses like Marks & Spencer. The conversation emphasizes the urgent need for robust cybersecurity measures to combat these evolving threats.

12 snips
Sep 13, 2025 • 60min
The Godfather of Zero Trust - A Discussion with John Kindervag
Join John Kindervag, the chief evangelist of Illumio and pioneer of the Zero Trust model, as he shares his 25 years of cybersecurity wisdom. He explains how Zero Trust was born from the flaws of traditional firewalls, pushing for a mindset shift in organizational security. With insights into the five essential steps for implementation, he stresses the importance of micro-segmentation and adapting strategies to combat modern threats like AI and social engineering. John's practical advice lays the foundation for resilient cybersecurity practices.

Sep 12, 2025 • 9min
Microsoft Patches Zero Day And More
Microsoft's recent patch update tackles 81 security flaws, including two severe vulnerabilities. A notable data breach in Canada has left sensitive information exposed. NVIDIA introduces an open-source AI tool to help detect vulnerabilities. Meanwhile, a US senator is pushing for an FTC investigation into Microsoft's security practices. The podcast also addresses the puzzling issue of bricked SSDs after a Windows 11 update. Tune in for the latest happenings in the cybersecurity landscape!

Sep 10, 2025 • 10min
iCloud Calendar Invites Disguise New Phishing Campaigns
Phishing scams are getting clever as attackers use iCloud calendar invites to bypass security checks. The U.S. Department of Defense faces risks after exposing sensitive livestream credentials. Meanwhile, billions of Android devices are vulnerable due to unpatched zero-day issues. In a bold move, the U.S. State Department has placed a $10 million bounty on three Russian hackers linked to energy sector attacks. The discussion emphasizes the crucial need for robust cybersecurity measures to protect our digital lives.

Sep 8, 2025 • 12min
Hackers Say Thanks For Lousy Security In Large Fast Food Chain
Delve into the alarming world of cybersecurity threats, featuring a major GitHub supply chain attack that leaked thousands of secrets. Discover the repercussions of the SalesLoft breach impacting key security firms and the troubling potential of AI vulnerabilities. Ethical hackers expose critical security flaws in a well-known fast-food chain, including hard-coded passwords and unauthorized recordings of customer interactions. The discussion underscores the urgent need for improved security in both software and restaurant tech.

Sep 6, 2025 • 32min
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
Nahman Khayet, an Israeli researcher known for automating exploit creation with AI, shares groundbreaking insights into the evolving landscape of cybersecurity. He reveals how his method slashes exploit development time from 192 days to just 15 minutes, raising alarms about the future of digital security. The conversation dives into the importance of the CVE Database and emphasizes the necessity for organizations to bolster their defenses against quicker, AI-driven threats. Khayet also discusses the dual challenge of fast coding and maintaining secure practices.

Sep 5, 2025 • 1min
Reminder of this week's schedule and preview of Weekend Edition.
This week features a schedule update, highlighting a shift to a shorter format. Excitement builds for an upcoming interview with researchers who have developed a method to turn CVEs into working exploits in just 15 minutes and for under a dollar using AI. This groundbreaking approach raises intriguing questions about the future of cybersecurity.

Sep 4, 2025 • 12min
Cloudflare Fends Off A Record Breaking 11.5 Tbps DDoS Attack
Cloudflare successfully thwarted a staggering 11.5 Tbps DDoS attack, showcasing the escalating challenges in digital defense. A concerning zero-click exploit affecting Apple users was patched by WhatsApp, urging high-risk individuals to take precautions. Supermarket refrigeration systems were highlighted for having critical vulnerabilities that could jeopardize food safety. Exposed Ollama AI servers raised alarms over self-hosted AI security risks. Meanwhile, a hacker group targeted Google, and Palo Alto Networks faced a supply chain breach involving stolen OAuth tokens.