Episodios

  • 50,000 Cisco Firewalls Exposed
    Oct 1 2025

    Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity

    In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the US, Canada, France, Netherlands, and the UK to address these risks, urging immediate patching and system updates. Additionally, the episode covers the emerging threat of real-time AI voice cloning, stressing the need for stricter security measures to prevent social engineering attacks. Listeners are encouraged to implement robust verification processes to secure their organizations and personal communications.

    00:00 Critical Sudo Flaw Warning
    00:21 Cisco Firewalls Vulnerabilities
    02:34 Western Digital MyCloud Devices at Risk
    03:48 AI Voice Cloning Threat
    05:16 Conclusion and Contact Information

    Más Menos
    6 m
  • Lockbit Is Back
    Sep 29 2025

    Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements

    In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously, and a critical vulnerability in Salesforce's AI agents known as forced leak prompt injection. Additionally, the episode delves into the growing capabilities of China's Ministry of State Security, which has become a significant cyber intelligence force under Xi Jinping, raising serious concerns for Western security agencies.

    00:00 Introduction to Cybersecurity Threats
    00:18 Lockbit 5.0: A New Ransomware Threat
    03:01 Salesforce AI Agents Vulnerability
    05:50 China's Cyber Intelligence Operations
    08:55 Conclusion and Call to Action

    Más Menos
    10 m
  • The Complex Landscape of AI and Cybersecurity
    Sep 27 2025

    Navigating the Complex Landscape of AI and Cybersecurity: A Conversation with Rob T. Lee

    In this weekend edition of Cybersecurity Today, host Jim Love interviews Rob T. Lee, the Chief AI Officer and Chief of Research at the SANS Institute. They discuss the intersection of AI, education, and security, highlighting the dual nature of AI as both a transformative technology with immense benefits and as a significant security risk. Rob shares his insights on how organizations can mitigate these risks by adopting a 'yes' framework towards AI, fostering a culture of learning and experimentation, and acknowledging the vulnerabilities and knowledge gaps in the field. He emphasizes the importance of community engagement, practical learning, and the role of AI champions in driving innovation while maintaining security. Throughout the conversation, they address the challenges of implementing AI governance and explore the need for continual adaptation in the fast-evolving tech landscape.

    00:00 Introduction and Guest Introduction
    00:25 AI: Potential and Risks
    01:26 Business vs. Security
    03:36 Rob's Background and Experience
    05:18 The Role of Practitioners in SANS
    08:46 Governance and Security Challenges
    17:13 The Crisis of Competency in AI
    25:03 Encouraging Hands-On Learning
    30:41 The Importance of Executive Involvement
    33:49 The Problem with Security and Shadow AI
    34:05 The Consequences of Shadow AI
    34:52 Evaluating and Banning AI Tools
    36:48 The Role of Executives in AI Adoption
    40:04 Learning and Adapting to AI
    42:47 The Importance of Community and Vulnerability
    51:19 Practical Steps for AI Governance
    58:47 Final Thoughts and Resources

    Más Menos
    1 h y 5 m
  • AI Shadow Leak Avoids Detection
    Sep 26 2025

    Cybersecurity Today: Shadow Leak, SIM Farm Shutdown, Cisco Zero-Day, FBI Warning & Android Advanced Protection

    In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity issues. Key topics include the discovery of the 'Shadow Leak' vulnerability in ChatGPT servers by Radware, the dismantling of a massive SIM farm near the United Nations by the US Secret Service, a zero-day vulnerability affecting up to 2 million Cisco devices, an FBI warning about spoofed Internet Crime Complaint Center (IC3) websites, and a reminder about enabling Advanced Protection on Android phones. The episode also includes a shoutout to Jim Love's new audiobook 'Elisa, A Tale of Quantum Kisses,' available on multiple platforms.

    00:00 Introduction and Sponsor Message
    00:29 Shadow Leak Hits ChatGPT Servers
    02:52 Massive SIM Farm Operation Uncovered
    04:44 Cisco's Zero-Day Vulnerability
    06:04 FBI Warns of Spoofed Crime Reporting Sites
    07:07 Android's Advanced Protection Mode
    08:00 Conclusion and Call to Action

    Más Menos
    9 m
  • GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident: Cybersecurity Today
    Sep 24 2025

    Cybersecurity Today: GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident

    In this episode of 'Cybersecurity Today', host Jim Love discusses GitHub's response to widespread supply chain attacks in the NPM ecosystem, the alarming rise of deep fake attacks as highlighted by Gartner, and the remarkable handling of a cyber incident by the city of Yellowknife. Tune in for the latest updates on cybersecurity threats, expert analysis, and the steps organizations are taking to combat these sophisticated attacks. Plus, discover Jim's sci-fi romance adventure audiobook 'Elisa: A Tale of Quantum Kisses' now available on major platforms.

    00:00 Introduction and Sponsor Message
    00:55 GitHub's Response to NPM Supply Chain Attacks
    03:19 Gartner's Warning on Deep Fake and AI Attacks
    06:03 Yellowknife's Cyber Incident and Response
    08:20 Conclusion and Final Thoughts

    Más Menos
    9 m
  • Extinction Level Cyber Vulnerability Now Fixed
    Sep 22 2025

    Cybersecurity Today: Major Vulnerabilities and Attacks Uncovered

    Join host David Shipley for today's cybersecurity updates on the last day of summer 2025. In this episode, we delve deep into Microsoft's critical Entra ID vulnerability, a cyber attack crippling major European airports, the rise of SpamGPT targeting phishing operations, and the alarming zero-click flaw in OpenAI's deep research agent. Hear about Canadian Police's big win against the shadowy Trade Ogre crypto platform and their $40 million asset seizure. Buckle up for a reality check on the evolving cyber threats and their impact on global security.

    00:00 Introduction and Overview
    00:55 Microsoft's Extinction Level Vulnerability
    05:19 European Airports Cyber Attack
    08:20 SpamGPT: AI for Cyber Criminals
    09:53 Shadow Leak: Zero Click AI Vulnerability
    12:09 Trade Ogre Takedown
    14:50 Conclusion and Upcoming Events

    Más Menos
    15 m
  • CST Replay: The Ransomware Ecosystem with Tammy Harper
    Sep 20 2025

    Unveiling the Ransomware Ecosystem with Tammy Harper

    In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned threat intelligence researcher, provides an in-depth introduction to the ransomware ecosystem. Explore the basics and nuances of ransomware, from its origins to its modern-day complexities. Tammy discusses not only the operational structures and notable ransomware groups like Conti, LockBit, and Scattered Spider, but also the impact and evolution of ransomware as a service. She also elaborates on ransomware negotiation tactics and how initial access brokers operate. This episode is packed with invaluable information for anyone looking to understand the cybercrime underground economy. Don’t forget to leave your questions in the comments, and they might be addressed in future episodes!

    00:00 Introduction and Episode Re-Run Announcement
    00:29 Guest Introduction: Tammy Harper from Flair io
    00:41 Exploring the Dark Web and Ransomware
    02:21 Tammy Harper's Background and Expertise
    03:40 Understanding the Ransomware Ecosystem
    04:02 Ransomware Business Models and Initial Access Brokers
    07:08 Double and Triple Extortion Tactics
    11:23 History of Ransomware: From AIDS Trojan to WannaCry
    13:02 The Rise of Ransomware as a Service (RaaS)
    19:41 Conti: The Ransomware Giant
    26:17 Conti's Tools of the Trade: EMOTET, ICEDID, and TrickBot
    32:05 The Conti Leaks and Their Impact
    34:04 LockBit and the Ransomware Cartel
    37:07 National Hazard Agency: A Subgroup of LockBit
    38:17 Release of Volume Two and Its Impact
    39:08 Details of the Training Manual
    40:52 Ransomware Negotiations
    41:28 Ransom Chat Project
    42:27 Conti vs. LockBit Negotiation Tactics
    43:30 Professionalism in Ransomware Operations
    47:07 Ransomware Chat Simulation
    48:03 Ransom Look Project
    49:11 Current Ransomware Landscape
    50:32 Infiltration and Research Methods
    51:47 Profiles of Emerging Ransomware Groups
    01:05:21 Initial Access Market
    01:10:26 Future of Ransomware and Law Enforcement Efforts
    01:13:14 Conclusion and Final Thoughts

    Más Menos
    1 h y 14 m
  • Cybersecurity Today - The Good News Edition
    Sep 19 2025

    Cybersecurity Today: The Good News Edition

    In this episode, host Jim Love addresses a previous mistake regarding the location of Yellowknife and announces a special 'good news' edition. Key stories include Microsoft's dismantling of a global phishing-as-a-service operation Raccoon 0365, the recovery of nearly $2 million lost to a business email compromise scam by a Texas county, and the Commonwealth Bank of Australia's significant reduction in scam losses through AI-powered defenses. The episode emphasizes lessons learned in cybersecurity and the positive outcomes from recent countermeasures. Love also mentions that the usual host, David Shipley, will return on Monday.

    00:00 Introduction and Apology
    01:38 Good News Stories Overview
    02:18 Microsoft Dismantles Raccoon 0365
    03:59 Texas County Recovers $2 Million
    05:51 CommBank's AI-Powered Scam Prevention
    08:01 Conclusion and Contact Information

    Más Menos
    8 m