Cybersecurity Today

Jim Love
undefined
Apr 4, 2025 • 10min

Cybersecurity Today: Unauthorized Scans, Signal App Usage, AI Image Risks, and a Missing Professor

Unauthorized network scans are on the rise, hinting at potential espionage involving Juniper and Palo Alto devices. The controversial use of the Signal app by a government team raises questions about security and compliance. Experts discuss the dangers of AI-generated images, particularly their potential for creating fraudulent documents. There’s also a chilling story about a missing cybersecurity professor amid an FBI investigation, leaving many concerned and curious about what really happened.
undefined
Apr 2, 2025 • 14min

Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities

This discussion highlights alarming cybersecurity incidents, including the compromise of Windows Defender and EDR systems by attackers using legitimate software. A massive data breach on X revealed over 200 million user records, while UK dating apps exposed 1.5 million private images due to coding flaws. The conversation touches on ransomware tactics and the complexities of ensuring effective security measures. Listeners gain practical insights into maintaining robust cybersecurity amidst rising threats and scams.
undefined
5 snips
Mar 31, 2025 • 7min

Canadian Hacker Linked To Anonymous Charged In Texas GOP Hack: Cyber Security Today for March 31, 2025

A Canadian hacker faces charges linked to the 2021 Texas GOP breach, raising alarms about political cybersecurity. The show uncovers vulnerabilities in solar power technology, highlighting risks in renewable energy. France's initiative to educate students with phishing simulations showcases proactive cybersecurity measures. The tragic case of an elderly couple in India, who took their lives after falling victim to fraud, highlights the devastating impacts of online scams and the urgent need for victim support.
undefined
Mar 29, 2025 • 54min

Cyber Security Today Profile Series: Dr. Priscilla Johnson on Environmental Engineering, Water Strategy, and Cyber Intelligence

Dr. Priscilla Johnson, an environmental advocate and former Director of Water Strategy at Microsoft, shares her unique journey at the intersection of technology and sustainability. She dives into the challenges of building a data center in drought-stricken South Africa, emphasizing innovative solutions for water scarcity. Dr. Johnson discusses her transition to cybersecurity, revealing the importance of situational awareness and the ethical dilemmas faced in corporate environments, particularly concerning aging infrastructure and public safety.
undefined
4 snips
Mar 28, 2025 • 8min

Government Officials' Data Leaks: Cyber Security Today for Friday, March 18, 2025

Significant cybersecurity breaches are putting U.S. government officials' personal data at risk, raising alarming national security concerns. A defense contractor faced hefty fines for failing to meet cybersecurity standards. The discovery of a young tech aide's involvement with a cybercrime group highlights vulnerabilities in government oversight and the potential fallout from youthful lapses in judgment. The discussion emphasizes the pressing need for enhanced cybersecurity measures across government and defense sectors.
undefined
4 snips
Mar 26, 2025 • 8min

Oracle Denies Hack Despite Hacker's Evidence: Cyber Security Today for March 26, 2025

Oracle faces intense scrutiny after denying a significant cloud breach linked to 6 million user records. In a stunning reveal, top-secret military information accidentally leaks to an editor at the Atlantic, raising alarms about secure communication protocols. Additionally, renowned security expert Troy Hunt shares his experience with a phishing attack on his MailChimp account, showcasing how even the knowledgeable can fall victim. Tune in for crucial insights into these pressing cybersecurity issues.
undefined
Mar 24, 2025 • 11min

Oracle Has One Of The Largest Supply Chain Breaches: Cyber Security Today For March 24, 2025

A massive breach at Oracle Cloud has put 6 million records at risk, impacting 140,000 businesses due to a vulnerability in their software. A new cyber attack method called 'browser-in-the-middle' can bypass multi-factor authentication, adding to security concerns. Additionally, a severe flaw in Synology's DiskStation Manager may allow remote takeovers of systems. The discussion also sheds light on troubling budget cuts at CISA, risking federal cyber defense capacity. Strategies for addressing these rising threats are critically examined.
undefined
14 snips
Mar 22, 2025 • 35min

The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions: Cyber Security Today

Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security, sheds light on the alarming rise of cyber threats against K-12 schools. He discusses how cyber criminals exploit financial information and schedules, making schools vulnerable. The conversation reveals the shocking impact of ransomware attacks on school communities and underscores the critical need for enhanced cybersecurity practices. Randy emphasizes the importance of designing security into technology and fostering community networks to better safeguard sensitive student data.
undefined
Mar 21, 2025 • 9min

IBM's Operating System Is A Perfect 10 - In Terms of Cybersecurity Vulnerability. Cyber Security Today for March 21, 2025

Explore the alarming vulnerabilities in IBM's AIX operating system, which received a perfect 10 for security risks. Discover how improper handling of sensitive data by U.S. agencies poses new challenges amid layoffs. YouTube sensation Matt Johansson exposes dangerous browser exploits that could jeopardize user security. Plus, find out about the removal of over 300 malicious Android apps from Google Play, highlighting the importance of cautious app downloads. Tune in for essential tips to bolster your cybersecurity defenses!
undefined
Mar 19, 2025 • 8min

Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations: Wednesday, March 19, 2025

Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations In this episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues including the exploitation of a server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure (CVE-2024-27564), leading attackers to redirect users to malicious URLs. He also talks about how researchers at Tiny Hack have made breakthroughs in cracking Akira ransomware using high-powered GPUs, and Malwarebytes' warning about malware embedded in free online file converters. The episode highlights the importance of robust cybersecurity measures, innovative methods to combat ransomware, and cautious internet usage. 00:00 Introduction to Cybersecurity Threats 00:19 Exploiting ChatGPT Vulnerabilities 02:15 Cracking Akira Ransomware 05:01 Malware in Free Online Converters 07:12 Conclusion and Listener Support

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app