Episodios

  • M365 Creds Stolen, $17.7B Robbed in US, AI Dominates RSAC, Axios Supply Chain Hack
    Apr 9 2026

    This week’s biggest cyber stories all point to the same hard truth: attackers are scaling faster than defenders, using automation, stolen tokens, and software supply chains to hit everything from Next.js apps and npm packages to routers, PLCs, and AI tools. And in several of these cases, they didn’t even need malware to cause serious damage.

    ★ Support this podcast on Patreon ★
    Más Menos
    18 m
  • $10M Music Scam, iPhone Crypto Theft, Intune Wipe Attack, Cisco 0-Day, Trivy Supply Chain Hack
    Mar 26 2026

    This week’s cyber stories are a reminder that attackers are no longer just stealing data—they’re hijacking the tools we trust most, from Microsoft Intune and Azure alerts to GitHub Actions and iPhones. We’ve got a massive medical-device breach, a major software supply-chain compromise, active ransomware zero-days, and phishing campaigns that bypass even encrypted messaging protections.

    ★ Support this podcast on Patreon ★
    Más Menos
    13 m
  • Steam Malware, Fake VPNs, BetterLeaks, INTERPOL Bust, and a Dangerous AI Agent
    Mar 19 2026

    This week in cyber, attackers turned Steam games into crypto-stealing malware, criminals used fake VPN downloads and live chat support to steal credentials in real time, and AI agents are suddenly becoming one of the biggest new enterprise security headaches. On top of that, critical flaws in Wing FTP, Veeam, and Linux AppArmor are reminding defenders that patching and identity protection still decide who wins.

    ★ Support this podcast on Patreon ★
    Más Menos
    13 m
  • Stryker Wiper Attack, Telus 1PB Breach, Macbook M5 Pro, AI Malware, GitHub Supply Chain Hack
    Mar 13 2026

    A wiper attack tied to Iranian-linked hacktivists reportedly crippled Stryker on a global scale, while ShinyHunters is now linked to both a massive Telus Digital breach and Salesforce Experience Cloud data theft campaigns. And if that wasn’t enough, defenders are also dealing with AI-generated malware, hidden prompt injection attacks against AI agents, and ransomware crews hitting healthcare hard across multiple regions. Also - the BRAND NEW MACBOOK PRO M5 PRO in person!!

    ★ Support this podcast on Patreon ★
    Más Menos
    19 m
  • AI Malware Flood, Cisco Firewall Vulnerabilities, and a Major Cybercrime Forum Takedown
    Mar 6 2026

    AI-generated malware is now being mass-produced by nation-state hackers, a major cybercrime forum selling stolen credentials has just been seized by law enforcement, and critical vulnerabilities in widely used enterprise systems could give attackers full control of corporate networks.

    At the same time, new espionage campaigns, phishing platforms that bypass multi-factor authentication, and even vehicle tire sensors are creating unexpected security risks.

    ★ Support this podcast on Patreon ★
    Más Menos
    12 m
  • Gemini Browser Hijack, SD-WAN Zero-Day, Hospital Ransomware, Iranian Cyber Threats
    Mar 3 2026

    Today’s Threatopia briefing covers zero-days exploited for years, ransomware shutting down hospital systems, AI agents being hijacked, and warnings of imminent nation-state retaliation.

    We have a Cisco SD-WAN zero-day abused for at least three years. APT28 exploiting a Microsoft MSHTML flaw with malicious shortcut files. APT37 breaching air-gapped networks using removable media. Hospitals in Mississippi forced offline by ransomware. And Google warning of likely Iranian cyber operations amid escalating geopolitical tensions.

    At the same time, AI is reshaping the threat landscape from multiple angles. We’re seeing browser-level AI privilege escalation in Chrome’s Gemini panel, large-scale AI scraping becoming a board-level risk, AI agents like OpenClaw exposed to takeover, and major policy fallout around Anthropic’s technology in federal environments.

    This episode is about convergence. Nation-state activity, ransomware impact, AI platform risk, and supply chain governance are no longer separate conversations. They are one interconnected risk surface.

    ★ Support this podcast on Patreon ★
    Más Menos
    15 m
  • Why Most Security Transformations Fail — And How to Avoid It
    Feb 26 2026

    Most organizations do not fail at security because they lack technology. They fail because they mistake tool replacement for transformation.

    TODAY we're going to talk about Why Most Security Transformations Fail — And How to Avoid It

    At the executive level, security transformation sits at the intersection of revenue protection, regulatory exposure, operational resilience, and brand trust. CIOs and CISOs are under increasing pressure from boards to demonstrate not just activity, but outcomes. Meanwhile, digital transformation initiatives accelerate cloud adoption, API expansion, AI integration, and DevOps velocity. The attack surface grows faster than traditional control frameworks can adapt.

    ★ Support this podcast on Patreon ★
    Más Menos
    21 m
  • CyberNews 2/20/26 - Hacker Busted, Dell RecoverPoint 0-Day Spy, AI Command & Control, 600K Data Leak
    Feb 20 2026

    Today’s Threatopia briefing spans supply chain compromise in npm and Android firmware, MFA-bypassing phishing kits, DNS-delivered PowerShell malware, AI assistants abused as covert command channels, and an actively exploited Dell zero-day tied to a suspected Chinese espionage group.

    We’re also looking at 600,000 leaked retail customer records, critical VoIP and Windows privilege escalation flaws, record-high ICS vulnerabilities, and a global cybercrime crackdown that led to 651 arrests.

    The common thread? Identity abuse, trusted platform compromise, and attackers hiding inside legitimate infrastructure.

    Let’s break it down.

    ★ Support this podcast on Patreon ★
    Más Menos
    11 m