

Cybersecurity Today
Jim Love
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Episodes
Mentioned books

Sep 24, 2025 • 9min
GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident: Cybersecurity Today
Discover GitHub's proactive measures against NPM supply chain attacks, as they lock down vulnerabilities amidst rising threats. Learn about Gartner's alarming findings on the spike in deep fake and generative AI attacks, where impersonations and malicious uses are on the rise. Plus, hear about Yellowknife's impressive response to a recent cyber incident, highlighting their early detection and transparent communication during the crisis. This engaging discussion offers vital insights into the evolving landscape of cybersecurity.

Sep 22, 2025 • 15min
Extinction Level Cyber Vulnerability Now Fixed
Discover the fallout from a critical Microsoft Entra ID vulnerability that allowed for dangerous impersonations. Learn about the cyber attack that caused chaos at European airports. Delve into SpamGPT, a new AI tool being misused for phishing scams, and a zero-click flaw that poses risks to user privacy. On a brighter note, hear how Canadian authorities struck a significant blow against crypto crime by seizing over $40 million from the Trade Ogre platform. Stay informed about the rapidly changing landscape of cyber threats!

Sep 20, 2025 • 1h 14min
CST Replay: The Ransomware Ecosystem with Tammy Harper
In this engaging discussion, Tammy Harper, a threat intelligence researcher at Flare.io specializing in ransomware, delves into the intricate ransomware ecosystem. She reveals how ransomware has evolved into a business with models like Ransomware as a Service (RaaS) and discusses the roles of initial access brokers. Tammy highlights infamous groups like Conti and LockBit, their double and triple extortion tactics, and the significance of negotiation strategies. This episode is a treasure trove for understanding the mechanisms of the cybercrime underground.

Sep 19, 2025 • 8min
Cybersecurity Today - The Good News Edition
In this uplifting edition, listeners hear about Microsoft's successful dismantling of a notorious phishing operation. A Texas county triumphantly recovers nearly $2 million lost to a business email scam. Additionally, the Commonwealth Bank of Australia showcases impressive reductions in scam losses thanks to AI technology. The host shares valuable lessons learned in cybersecurity, highlighting recent positive developments that inspire hope in the battle against cyber threats.

Sep 17, 2025 • 9min
Shai-Hulud Worm - A Self Propagating Supply Chain Threat
Discover the alarming rise of the 'Shai-Hulud' worm, which compromises over 187 JavaScript libraries by exploiting developer tokens. Delve into the clever use of steganography, where malicious commands hide in plain sight within harmless images. Learn about a significant cyber incident in Yellowknife that crippled municipal services, highlighting the struggles of local governments with cyber defenses. Lastly, uncover new vulnerabilities introduced by a Windows 11 patch, reminding system admins of the urgent need for vigilant updates.

Sep 15, 2025 • 9min
NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley
Recent discussions reveal a massive NPM attack that exposed critical vulnerabilities in the software supply chain, yet hackers came away with little. A new phishing service, Void Proxy, poses a sophisticated threat to major accounts on Microsoft and Google. The fallout from cyber attacks on companies like Jaguar Land Rover highlights severe impacts on supply chains and leadership changes at businesses like Marks & Spencer. The conversation emphasizes the urgent need for robust cybersecurity measures to combat these evolving threats.

31 snips
Sep 13, 2025 • 60min
The Godfather of Zero Trust - A Discussion with John Kindervag
Join John Kindervag, the chief evangelist of Illumio and pioneer of the Zero Trust model, as he shares his 25 years of cybersecurity wisdom. He explains how Zero Trust was born from the flaws of traditional firewalls, pushing for a mindset shift in organizational security. With insights into the five essential steps for implementation, he stresses the importance of micro-segmentation and adapting strategies to combat modern threats like AI and social engineering. John's practical advice lays the foundation for resilient cybersecurity practices.

Sep 12, 2025 • 9min
Microsoft Patches Zero Day And More
Microsoft's recent patch update tackles 81 security flaws, including two severe vulnerabilities. A notable data breach in Canada has left sensitive information exposed. NVIDIA introduces an open-source AI tool to help detect vulnerabilities. Meanwhile, a US senator is pushing for an FTC investigation into Microsoft's security practices. The podcast also addresses the puzzling issue of bricked SSDs after a Windows 11 update. Tune in for the latest happenings in the cybersecurity landscape!

Sep 10, 2025 • 10min
iCloud Calendar Invites Disguise New Phishing Campaigns
Phishing scams are getting clever as attackers use iCloud calendar invites to bypass security checks. The U.S. Department of Defense faces risks after exposing sensitive livestream credentials. Meanwhile, billions of Android devices are vulnerable due to unpatched zero-day issues. In a bold move, the U.S. State Department has placed a $10 million bounty on three Russian hackers linked to energy sector attacks. The discussion emphasizes the crucial need for robust cybersecurity measures to protect our digital lives.

Sep 8, 2025 • 12min
Hackers Say Thanks For Lousy Security In Large Fast Food Chain
Delve into the alarming world of cybersecurity threats, featuring a major GitHub supply chain attack that leaked thousands of secrets. Discover the repercussions of the SalesLoft breach impacting key security firms and the troubling potential of AI vulnerabilities. Ethical hackers expose critical security flaws in a well-known fast-food chain, including hard-coded passwords and unauthorized recordings of customer interactions. The discussion underscores the urgent need for improved security in both software and restaurant tech.


