Episodios

  • Weaponizing human trust to bypass security
    Apr 5 2026

    In today’s Cybersecurity Daily, we break down the biggest threats shaping April 2026. A coordinated npm supply chain attack involving 36 malicious packages is targeting developers through post-install scripts, exploiting Redis and PostgreSQL to deploy persistent backdoors and steal sensitive data.

    We also uncover new details behind the Axios npm hack, where attackers used a fake Microsoft Teams error to socially engineer a maintainer and inject malware into widely used packages. Meanwhile, device code phishing attacks have surged over 37x, allowing attackers to hijack sessions and bypass traditional credential-based defenses.

    Plus, we analyze the European Commission cloud breach, showing how a single compromised AWS key led to multi-entity data exposure, along with critical ShareFile RCE vulnerabilities and stealthy Linux PHP web shell persistence techniques.

    The key takeaway: modern cyber attacks are shifting from exploits to identity, trust, and automation abuse and defenders must adapt fast.

    Más Menos
    7 m
  • Cybersecurity Today: EU Cloud Breach, Axios Supply Chain Attack, React2Shell Exploits & $285M Crypto Hack (April 2026)
    Apr 3 2026

    In today’s episode of Cybersecurity Today, we break down the most critical cyber threats shaping April 2026. A major European Commission cloud breach linked to a stolen AWS key highlights the cascading impact of supply chain attacks, exposing data across dozens of EU institutions.

    We also uncover a sophisticated Axios npm supply chain compromise tied to North Korean actors, showing how social engineering is now targeting open-source maintainers at scale. Meanwhile, attackers are actively exploiting the React2Shell vulnerability in Next.js apps, compromising hundreds of systems and harvesting cloud credentials, API keys, and sensitive secrets.

    Plus, we analyze a $285 million crypto governance takeover, new ShareFile pre-auth RCE vulnerabilities, and SparkCat mobile malware stealing crypto wallet recovery phrases directly from photo galleries.

    This episode explores a key theme: identity, trust, and human workflows are now the primary attack surface not just code vulnerabilities.

    Más Menos
    6 m
  • Cybersecurity Breakdown: Supply Chain Attacks, Chrome Zero-Day, AI Fraud Surge & Mobile Spyware Threats (April 2026)
    Apr 2 2026

    Stay ahead of today’s rapidly evolving threat landscape in this episode of Cybersecurity Breakdown. We cover major April 2026 cybersecurity developments, including a massive software supply chain attack impacting tools like Trivy, KICS, and LiteLLM, exposing hundreds of thousands of systems and sensitive credentials.

    We also dive into the latest Google Chrome zero-day vulnerability (CVE-2026-5281) actively exploited in the wild, and why urgent patching is critical for enterprises. On the mobile front, we analyze a WhatsApp spyware campaign using fake iOS apps, highlighting the growing role of social engineering in surveillance operations.

    Plus, Apple’s response to the DarkSword exploit kit, Cisco’s critical vulnerability patches, and new insights from the World Economic Forum on AI-powered fraud, now a global-scale cyber risk.

    This episode breaks down what matters most: supply chain security, mobile threats, browser exploits, and AI-driven cybercrime trends—and what security professionals must do next.

    Más Menos
    5 m
  • Hackers are hijacking our trusted software
    Apr 1 2026

    In this episode, we break down the latest cybersecurity threats shaking the digital world—from supply chain compromises like the Axios npm attack to AI-driven fraud becoming a global risk. As attackers increasingly target the very systems we trust package managers, AI platforms, and update channels we explore what this means for organizations and defenders. If trust is the new vulnerability, how do we secure it? Stay ahead with sharp insights into today’s most critical cyber threats.

    Más Menos
    6 m
  • Your security tools are now backdoors
    Mar 31 2026

    A concise daily intelligence report on the latest cyber threats, nation-state activity, and security trends built for defenders, analysts, and tech leaders.

    Más Menos
    5 m
  • Breaking Trust: AI, Identity Systems, and the New Cyber Battleground
    Mar 31 2026

    In today’s episode, we break down the most critical cybersecurity stories shaping the threat landscape right now. From OpenAI patching serious data exfiltration and command injection flaws, to active exploitation of Citrix NetScaler vulnerabilities, attackers are increasingly targeting the systems we trust the most. We also explore the rise of advanced malware campaigns like DeepLoad, developer-focused phishing through GitHub, and major breaches impacting the European Commission and healthcare provider CareCloud.

    The key theme? Cyber risk is shifting toward trust layers AI agents, identity infrastructure, developer workflows, and cloud platforms. If you care about where cybersecurity is heading next, this is an episode you don’t want to miss.

    Más Menos
    5 m
  • CyberStrikeAI Exploits and Motorola GrapheneOS Hardware
    Mar 3 2026

    This week in cybersecurity: global corporations and critical infrastructure are under pressure. Paint giant AkzoNobel confirms a ransomware breach with 170GB of sensitive data stolen, while LexisNexis faces fallout after millions of records including government emails are leaked online. Meanwhile, a China-linked AI tool dubbed CyberStrikeAI is automating firewall exploitation across 55 countries, signaling a dangerous shift toward AI-powered cyber warfare. In mobile security, Motorola partners with GrapheneOS to bring hardened privacy-focused devices mainstream. And to top it off, Facebook suffers a massive worldwide outage, sparking speculation about possible infrastructure failures.

    Stay tuned as we break down what this means for organizations, governments, and you.

    Más Menos
    4 m
  • Hackers Hire Actors and Poison NuGet Packages
    Feb 25 2026

    Tonight in cyber: social engineers are being recruited for $1,000 per call, zero-day exploits are tied to nation-state brokers, and supply chain attacks are silently compromising developers.

    From SLH’s vishing-for-hire campaign targeting IT help desks, to malicious NuGet packages infecting ASP.NET applications, to active exploitation of Cisco SD-WAN authentication bypass flaws — the threat landscape is accelerating.

    We break down Chinese cyber-espionage campaigns, ransomware-linked data breaches, U.S. sanctions over stolen zero-days, and the growing impact of AI-driven security disruption shaking the market.

    This is your frontline briefing on the breaches, exploits, and global cyber power plays shaping today’s digital battlefield. Stay informed. Stay vigilant.

    Más Menos
    5 m