Cybersecurity Today

Jim Love
undefined
Sep 24, 2025 • 9min

GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident: Cybersecurity Today

Discover GitHub's proactive measures against NPM supply chain attacks, as they lock down vulnerabilities amidst rising threats. Learn about Gartner's alarming findings on the spike in deep fake and generative AI attacks, where impersonations and malicious uses are on the rise. Plus, hear about Yellowknife's impressive response to a recent cyber incident, highlighting their early detection and transparent communication during the crisis. This engaging discussion offers vital insights into the evolving landscape of cybersecurity.
undefined
Sep 22, 2025 • 15min

Extinction Level Cyber Vulnerability Now Fixed

Discover the fallout from a critical Microsoft Entra ID vulnerability that allowed for dangerous impersonations. Learn about the cyber attack that caused chaos at European airports. Delve into SpamGPT, a new AI tool being misused for phishing scams, and a zero-click flaw that poses risks to user privacy. On a brighter note, hear how Canadian authorities struck a significant blow against crypto crime by seizing over $40 million from the Trade Ogre platform. Stay informed about the rapidly changing landscape of cyber threats!
undefined
Sep 20, 2025 • 1h 14min

CST Replay: The Ransomware Ecosystem with Tammy Harper

In this engaging discussion, Tammy Harper, a threat intelligence researcher at Flare.io specializing in ransomware, delves into the intricate ransomware ecosystem. She reveals how ransomware has evolved into a business with models like Ransomware as a Service (RaaS) and discusses the roles of initial access brokers. Tammy highlights infamous groups like Conti and LockBit, their double and triple extortion tactics, and the significance of negotiation strategies. This episode is a treasure trove for understanding the mechanisms of the cybercrime underground.
undefined
Sep 19, 2025 • 8min

Cybersecurity Today - The Good News Edition

In this uplifting edition, listeners hear about Microsoft's successful dismantling of a notorious phishing operation. A Texas county triumphantly recovers nearly $2 million lost to a business email scam. Additionally, the Commonwealth Bank of Australia showcases impressive reductions in scam losses thanks to AI technology. The host shares valuable lessons learned in cybersecurity, highlighting recent positive developments that inspire hope in the battle against cyber threats.
undefined
Sep 17, 2025 • 9min

Shai-Hulud Worm - A Self Propagating Supply Chain Threat

Discover the alarming rise of the 'Shai-Hulud' worm, which compromises over 187 JavaScript libraries by exploiting developer tokens. Delve into the clever use of steganography, where malicious commands hide in plain sight within harmless images. Learn about a significant cyber incident in Yellowknife that crippled municipal services, highlighting the struggles of local governments with cyber defenses. Lastly, uncover new vulnerabilities introduced by a Windows 11 patch, reminding system admins of the urgent need for vigilant updates.
undefined
Sep 15, 2025 • 9min

NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley

Recent discussions reveal a massive NPM attack that exposed critical vulnerabilities in the software supply chain, yet hackers came away with little. A new phishing service, Void Proxy, poses a sophisticated threat to major accounts on Microsoft and Google. The fallout from cyber attacks on companies like Jaguar Land Rover highlights severe impacts on supply chains and leadership changes at businesses like Marks & Spencer. The conversation emphasizes the urgent need for robust cybersecurity measures to combat these evolving threats.
undefined
31 snips
Sep 13, 2025 • 60min

The Godfather of Zero Trust - A Discussion with John Kindervag

Join John Kindervag, the chief evangelist of Illumio and pioneer of the Zero Trust model, as he shares his 25 years of cybersecurity wisdom. He explains how Zero Trust was born from the flaws of traditional firewalls, pushing for a mindset shift in organizational security. With insights into the five essential steps for implementation, he stresses the importance of micro-segmentation and adapting strategies to combat modern threats like AI and social engineering. John's practical advice lays the foundation for resilient cybersecurity practices.
undefined
Sep 12, 2025 • 9min

Microsoft Patches Zero Day And More

Microsoft's recent patch update tackles 81 security flaws, including two severe vulnerabilities. A notable data breach in Canada has left sensitive information exposed. NVIDIA introduces an open-source AI tool to help detect vulnerabilities. Meanwhile, a US senator is pushing for an FTC investigation into Microsoft's security practices. The podcast also addresses the puzzling issue of bricked SSDs after a Windows 11 update. Tune in for the latest happenings in the cybersecurity landscape!
undefined
Sep 10, 2025 • 10min

iCloud Calendar Invites Disguise New Phishing Campaigns

Phishing scams are getting clever as attackers use iCloud calendar invites to bypass security checks. The U.S. Department of Defense faces risks after exposing sensitive livestream credentials. Meanwhile, billions of Android devices are vulnerable due to unpatched zero-day issues. In a bold move, the U.S. State Department has placed a $10 million bounty on three Russian hackers linked to energy sector attacks. The discussion emphasizes the crucial need for robust cybersecurity measures to protect our digital lives.
undefined
Sep 8, 2025 • 12min

Hackers Say Thanks For Lousy Security In Large Fast Food Chain

Delve into the alarming world of cybersecurity threats, featuring a major GitHub supply chain attack that leaked thousands of secrets. Discover the repercussions of the SalesLoft breach impacting key security firms and the troubling potential of AI vulnerabilities. Ethical hackers expose critical security flaws in a well-known fast-food chain, including hard-coded passwords and unauthorized recordings of customer interactions. The discussion underscores the urgent need for improved security in both software and restaurant tech.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app