Cybersecurity Today Podcast Por Jim Love arte de portada

Cybersecurity Today

Cybersecurity Today

De: Jim Love
Escúchala gratis

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time. Política y Gobierno
Episodios
  • Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley
    Apr 3 2026

    EV Charging Infrastructure Security: How Hackers Could Disrupt Chargers, Networks, and the Grid

    Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst

    In this holiday weekend edition of Cybersecurity Today, Jim Love introduces David Shipley's interview with Steve Visconti, CEO of Xiid Corporation, about cybersecurity risks in electric vehicle (EV) charging infrastructure. Visconti explains Xiid's software-based security layer for IP networks, aimed at critical infrastructure across enterprise, public sector, and DOD environments, and its growing focus on OT/IoT such as EV charging systems. The discussion highlights how EV chargers connect vehicles, homes, back-office billing/control systems, cloud services, and potentially vehicle-to-grid power flows, creating large-scale attack surfaces that could enable disruption, DDoS activity, or broader grid instability. Visconti argues for "unreachability" architectures that close ports and remove static exposure while allowing only registered users and machine-to-machine access. The interview also touches on concerns about vulnerabilities leading to fires, supply-chain risks, and policy debates such as government-accessible vehicle kill switches.

    00:00 Holiday Weekend Intro
    01:46 Meet Steve Visconti
    04:16 EV Charging Symposium
    06:40 Vehicle to Grid Risks
    09:16 Fires and Attack Vectors
    12:14 Making Chargers Unreachable
    14:37 Car as the Threat
    19:05 Awareness and DDoS Reality
    23:09 Government Kill Switch Debate
    24:49 Wrap Up and Sponsor Thanks

    Más Menos
    27 m
  • Russian State Hackers Go After IoS Devices
    Mar 30 2026

    Mac Malware 'Infinity Stealer,' DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits

    Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst

    David Shipley reports from Seoul on major threats: Malwarebytes details Infinity Stealer, a new macOS info-stealer delivered via "ClickFix" social engineering and built as a compiled Python payload (Nuitka) that steals browser credentials, Keychain data, crypto wallets, and developer secrets while notifying attackers via Telegram. Proofpoint links Russia-aligned TA446 (Cold River/Star Blizzard) to spear-phishing using the DarkSword iOS exploit kit to deliver GhostBlade, with DarkSword now leaked on GitHub and Apple pushing unusual on-device warnings for vulnerable iOS versions. Rapid7 describes China-linked "Red Menshen" using the kernel-level BPFdoor backdoor to persist in global telecom networks. TeamTNT compromises the Telnyx PyPI package with WAV-steganography payloads that steal secrets and target Kubernetes. Iran-linked activity includes a symbolic FBI director email breach and escalating, deliberate healthcare disruption via attacks on Stryker and a Pay2Key incident.

    00:00 Show Intro and Sponsor
    00:53 Mac ClickFix Stealer
    03:25 Dark Sword iOS Exploits
    06:30 China Telecom Backdoor
    08:47 TeamTNT PyPI Supply Chain
    12:20 Iran Cyber and Healthcare
    17:41 Wrap Up and Thanks
    18:43 Sponsor Message

    Más Menos
    20 m
  • Cisco Breached: Source Code Stolen - Cybersecurity Today
    Apr 1 2026

    Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws

    David Shipley reports multiple major security incidents: attackers used credentials stolen in the Trivy supply-chain attack via a malicious GitHub action to breach Cisco's internal development environment, clone 300+ GitHub repos, steal source code (including AI products) and AWS keys, and impact customer-related code; Cisco contained the breach, re-imaged systems, and rotated credentials. A separate supply-chain attack hit the widely used JavaScript library Axios after its maintainer account was compromised, pushing poisoned NPM versions that installed a dropper/RAT via a fake dependency; users are told to downgrade affected versions, remove the dependency, rotate credentials, and review CI/CD logs. Active exploitation is confirmed for a Fortinet FortiClient EMS SQL injection (CVE-2026-21643) and for critical Citrix NetScaler flaws (CVE-2026-3055, possibly alongside CVE-2026-4368). Anthropic accidentally exposed details of a new model, "Code Mythos," described as highly capable in reasoning, coding, and cybersecurity. Finally, TechCrunch reports escalating allegations that compliance startup Delve helped fabricate audit evidence and worked with weak auditors. The episode also marks show episode 1,500.

    00:00 Headlines and Sponsor
    00:54 Cisco Trivy Breach
    02:28 Axios NPM Attack
    04:12 Fortinet SQLi Exploited
    06:24 Citrix Bleed Returns
    08:05 Anthropic Model Leak
    10:24 Fake Compliance Scandal
    12:30 Episode 1500 Milestone
    14:03 Sponsor Closing Message

    Más Menos
    15 m
Todas las estrellas
Más relevante
These podcast episodes are delivered in a way that works for both people within and outside of the industry. The hosts are very knowledgeable and seasoned, having years of experience in the field.

Informative and Accessible

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

It is obvious that the person reporting has worked in this field. As he is reporting, the way the story is delivered is told in the exact manner that someone who as seen the ridiculous Cyber hygiene of some of these companies that should know better it perfect. You can often hear the smile on his face. I cannot tell you how much this resonates with me as a person that has screamed the importance of some of these routine and minor prevention methods that could stop these attacks.

Love your delivery!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

This is a great podcast for those looking to stay up to date with recent developments in cyber security.

Awesome!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.