PLAY PODCASTS
Talkin' Bout [Infosec] News

Talkin' Bout [Infosec] News

337 episodes — Page 1 of 7

The Canvas / Instructure Breach – 2026-05-11

May 12, 20261h 3m

Utah Bans VPN Age Bypass - 2026-05-04

May 11, 20261h 10m

NASA Gets Phished by Chinese - 2026-04-27

Apr 28, 20261h 10m

Tim Cook Announces Apple CEO Exit - 2026-04-20

Apr 22, 20261h 4m

Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13

Apr 14, 20261h 6m

Artemis Astronaut's Bad Outlooks - 2026-04-06

Apr 9, 20261h 6m

S6 Ep 13FCC Blocks Foreign-Made Routers – 2026-03-30

This episode covers the FCC’s move to restrict or ban certain foreign-made networking equipment—especially routers tied to Chinese manufacturers—highlighting the potential cybersecurity risks, supply chain implications, and how the rule could affect ISPs and consumers. The hosts also discuss broader concerns around hardware trust, existing infrastructure, and what qualifies as “approved” devices under FCC guidelines, along with a brief, lighter mention of a viral robot incident making the rounds online.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Robot Handlers (05:11) - FCC Blocks Foreign-Made Routers – 2026-03-30 (06:44) - Story # 1: FCC moves to block new foreign-made routers (17:00) - Story # 2: FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers (20:07) - Story # 3: FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops (24:18) - Story # 4: LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign (27:49) - Story # 4b: TeamPCP Supply Chain Campaign (42:45) - Story # 5: Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies (45:51) - Story # 6: Anthropic readies Mythos model with high cybersecurity risk (57:31) - Story # 7: Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web (01:02:24) - Story # 8: DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It (01:04:03) - Securing the Cloud: Foundations by Andrew Krug (01:04:47) - Incident Response Simplified by Patterson Cake News LinksStory # 1: FCC moves to block new foreign-made routersStory # 2: FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian HackersStory # 3: FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage OpsStory # 4: LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaignStory # 4b: TeamPCP Supply Chain CampaignStory # 5: Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian SpiesStory # 6: Anthropic readies Mythos model with high cybersecurity riskStory # 7: Google Ships WebMCP, The Browser-Based Backbone For The Agentic WebStory # 8: DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind ItSecuring the Cloud: Foundations by Andrew KrugIncident Response Simplified by Patterson CakeCreators & Guests Andy Pettit "Nerf" - Guest Andrew Krug - Guest Wade Wells - Host Corey Ham - Host Bronwen Aker - Host Patterson Cake - Guest Ryan Poirier - Producer Ralph May - Host Click here to watch this episode on YouTube. Click here to view the episode transcript. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Apr 1, 20261h 7m

S6 Ep 12Pentagon Plans to Train AI With Classified Data – 2026-03-23

This episode covers a range of cybersecurity and AI-related news, including how Pokémon Go players may have unknowingly helped train delivery robots using massive image datasets. The hosts also discuss the Pentagon’s reported plans to train AI systems on classified data and the potential risks of exposing sensitive information. Additional topics include major data breaches (such as a third-party breach impacting Crunchyroll user data), ongoing challenges in cybersecurity practices, evolving AI security concerns, and real-world examples of exploits and vulnerabilities affecting mobile devices and organizations.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Easier Than Printers (05:20) - Pentagon Plans to Train AI With Classified Data – BHIS - Talkin' Bout [infosec] News 2026-03-23 (06:38) - Story # 1: Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (07:38) - Story # 1b: ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (15:35) - Story # 2: Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway (24:31) - Story # 3: The Pentagon is planning for AI companies to train on classified data, defense official says (34:04) - Story # 4: CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization (37:50) - Story # 5: Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead (42:21) - Story # 6: CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963) (49:57) - Story # 7: Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data (51:28) - Story # 8: Anime fans' credit cards might be stolen from Sony streamer Crunchyroll (55:03) - Story # 9: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors LinksStory # 1: Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the WebStory # 1b: ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the WebStory # 2: Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anywayStory # 3: The Pentagon is planning for AI companies to train on classified data, defense official saysStory # 4: CISA Urges Endpoint Management System Hardening After Cyberattack Against US OrganizationStory # 5: Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use InsteadStory # 6: CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)Story # 7: Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing DataStory # 8: Anime fans’ credit cards might be stolen from Sony streamer CrunchyrollStory # 9: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat ActorsCreators & Guests John Strand - Host Ralph May - Host Chadd Watson - Guest Wade Wells - Host Alex Minster "Belouve" - Guest Hayden Covington - Host Bruce Potter - Guest Ryan Poirier - Producer Click here to watch this episode on YouTube. Click here to view the episode transcript. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Mar 27, 20261h 4m

S6 Ep 11Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16

This episode covers multiple cybersecurity news stories, including Iranian hackers claiming responsibility for a cyberattack on Stryker, ongoing challenges in attributing nation-state cyber operations, and broader trends in global cyber conflict. The hosts also discuss the reliability of public breach claims, emerging threats targeting critical industries, and how organizations are responding to an increasingly complex threat landscape.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Organizing Family Beets (04:02) - Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16 (08:56) - Story # 1: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker (23:38) - Story # 2: How We Hacked McKinsey's AI Platform (32:30) - Story # 3: Amazon holds engineering meeting following AI-related outages (39:11) - Story # 4: Meta gets into social networks for AI agents with acquisition of viral Moltbook platform (45:24) - Story # 5: Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026 (50:45) - Story # 6: Michelin Confirms Data Breach Linked to Oracle EBS Attack (51:08) - Story # 7: New Dohdoor malware campaign targets education and health care (58:10) - Story # 8: Man's dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers LinksStory # 1: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm StrykerStory # 2: How We Hacked McKinsey’s AI PlatformStory # 3: Amazon holds engineering meeting following AI-related outagesStory # 4: Meta gets into social networks for AI agents with acquisition of viral Moltbook platformStory # 5: Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026Story # 6: Michelin Confirms Data Breach Linked to Oracle EBS AttackStory # 7: New Dohdoor malware campaign targets education and health careStory # 8: Man’s dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchersCreators & Guests Dan Rearden (Haircutfish) - Guest Bronwen Aker - Host Ralph May - Host John Strand - Host Troy Wojewoda - Guest Corey Ham - Host Hayden Covington - Host Wade Wells - Host Meagan Bentley - Producer Click here to watch this episode on YouTube. Click here to view the episode transcript. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Mar 17, 20261h 1m

S6 Ep 10A Nightmare of Vibeware - 2026-03-09

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — That's Not How It Works (03:40) - A Nightmare of Vibeware – 2026-03-09 (04:54) - Story # 1: APT36: A Nightmare of Vibeware (13:56) - Story # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres (16:28) - Story # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report (24:28) - Story # 4: Introducing the First Frontier Suite built on Intelligence + Trust (28:59) - Story # 5: Motorola partners with GrapheneOS for future phones (29:13) - Story # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OS (29:53) - Story # 6: Western allies form 6G security coalition amid tech rivalry with China (34:01) - Story # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacks (35:47) - Story # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026 (44:33) - Story # 9: LexisNexis confirms data breach as hackers leak stolen files (49:10) - Story # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutional (55:59) - ANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuiggan (56:47) - SOC Summit 2026 LinksStory # 1: APT36: A Nightmare of VibewareStory # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centresStory # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: ReportStory # 4: Introducing the First Frontier Suite built on Intelligence + TrustStory # 5: Motorola partners with GrapheneOS for future phonesStory # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OSStory # 6: Western allies form 6G security coalition amid tech rivalry with ChinaStory # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacksStory # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026Story # 9: LexisNexis confirms data breach as hackers leak stolen filesStory # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutionalANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuigganTroy & Wade’s Upcoming Things:– Antisyphon Training SOC Summit 2026– Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda– Network Forensics and Incident Response with Troy Wojewoda🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Mar 10, 20261h 0m

S6 Ep 9Pentagon Declares Anthropic a Supply Chain Risk — 2026-03-02

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Kerberoasting Too Hard (05:05) - Pentagon Declares Anthropic a Supply Chain Risk — Talkin’ Bout [infosec] News 2026-03-02 (08:40) - Story # 1: Pentagon Designates Anthropic Supply Chain Risk (17:27) - Story # 2: European Parliament blocks AI on lawmakers’ devices, citing security risks (21:23) - Story # 3: Mexican Government Breach and the Rise of Agentic Cyber Threats (22:58) - Story # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface (33:04) - Story # 5: Leak confirms GrapheneOS & Motorola partnership for non-Pixel hardware (38:24) - Story # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio (39:21) - Story # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems (43:12) - Story # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaks (45:40) - Story # 8: Discord puts global age verification policy on hold after backlash (46:30) - Story # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setup (51:51) - Story # 10: User accidentally gains control of over 6,700 robot vacuums (53:35) - Story # 11: App Warns You if Someone Is Wearing Smart Glasses Nearby (57:32) - Weekly CTF Winners (58:28) - Story # 12: Microsoft is blocking 'Microslop' comments in Copilot's official Discord server (59:01) - Story # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises LinksStory # 1: Pentagon Designates Anthropic Supply Chain RiskStory # 2: European Parliament blocks AI on lawmakers’ devices, citing security risksStory # 3: Mexican Government Breach and the Rise of Agentic Cyber ThreatsStory # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack SurfaceStory # 5: Leak confirms GrapheneOS & Motorola partnership for non-Pixel hardwareStory # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolioStory # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN SystemsStory # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaksStory # 8: Discord puts global age verification policy on hold after backlashStory # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setupStory # 10: User accidentally gains control of over 6,700 robot vacuumsStory # 11: App Warns You if Someone Is Wearing Smart Glasses NearbyStory # 12: Microsoft is blocking ‘Microslop’ comments in Copilot’s official Discord serverStory # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Mar 6, 20261h 4m

S6 Ep 8The Coming SAAS Apocalypse - 2026-02-23

In this episode:Agentic AI tools that can autonomously perform tasks like researching and booking flights, raising concerns about automated purchases, fraud, guardrails, and over-trust in AI systems.The idea of a coming “SaaS apocalypse,” where AI tools could replicate or replace many small- and mid-tier SaaS products by crawling and recreating their functionality—potentially disrupting payroll, accounting, and other service platforms.Android’s shift away from its open-platform roots, including concerns about reduced openness, developer anonymity in app stores, and the broader implications for privacy-focused users and alternative operating systems.Ongoing tensions in the tech ecosystem around platform control, openness, and general-purpose computing, particularly involving large vendors like Google, Apple, Oracle, and major cloud providers.Broader security implications of AI adoption, including hallucinations, accountability, and how organizations are integrating AI to cut costs versus innovate.The discussion centers strictly on these current tech news developments and their security, privacy, and market impact.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Take the interstate to Dubai (04:53) - The Coming SAAS Apocalypse - 2026-02-23 (07:39) - Story # 1: Keep Android Open (15:34) - Story # 2: Meta patents AI that takes over a dead person’s account to keep posting and chatting (21:13) - Story # 3: The Coming SaaS Apocalypse... (28:52) - Story # 4: Firm Data on AI (29:43) - Story # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago (36:15) - Story # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports (40:41) - Story # 6: Conduent data breach could be largest in U.S. history (43:13) - Story # 6: The Erosion of Agency and the New Burden on Leaders (46:02) - Story # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability (48:30) - Story # 8: AI-augmented threat actor accesses FortiGate devices at scale (51:42) - Story # 9: I hacked ChatGPT and Google's AI - and it only took 20 minutes (01:03:07) - Antisyphon Training SOC Summit, March 25, 2026 (01:03:40) - Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM Systems (01:03:58) - Antisyphon Workshop: Hacking AI-LLM Applications (01:04:27) - Antisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK (01:04:53) - PODCAST : A.I. Security Ops LinksStory # 1: Keep Android OpenStory # 2: Meta patents AI that takes over a dead person’s account to keep posting and chattingStory # 3: The Coming SaaS Apocalypse…Story # 4: Firm Data on AIStory # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years agoStory # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reportsStory # 6: Conduent data breach could be largest in U.S. historyStory # 6: The Erosion of Agency and the New Burden on LeadersStory # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential VulnerabilityStory # 8: AI-augmented threat actor accesses FortiGate devices at scaleStory # 9: I hacked ChatGPT and Google’s AI - and it only took 20 minutesAntisyphon Training SOC Summit, March 25, 2026Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM SystemsAntisyphon Workshop: Hacking AI-LLM ApplicationsAntisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREKPODCAST : A.I. Security Ops🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to watch this episode on YouTube. Click here to view the episode transcript.

Feb 25, 20261h 6m

S6 Ep 7Palo Alto Fears China Retaliation – 2026-02-16

In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today’s cyber landscape.They also explore the escalating AI arms race, including Meta’s aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Threat Actor Age Range (05:37) - Palo Alto Fears China Retaliation – 2026-02-16 (11:28) - Story # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say (16:01) - Story # 2: Rent a Human (20:39) - Story # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman says (24:31) - Story # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead (28:30) - Story # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use (30:32) - Story # 6: Data Exfil from Agents in Messaging Apps (32:15) - Story # 7: AMOS infostealer targets macOS through a popular AI app (39:25) - Story # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach (46:11) - Story # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next month (49:59) - Story # 10: SolarWinds Web Help Desk Exploitation - February 2026 (54:00) - Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers (58:13) - Story # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks (01:00:59) - Eric's Workshop (01:01:31) - Jennifer's Workshop (01:04:36) - SOC Summit 2026 LinksStory # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources sayStory # 2: Rent a HumanStory # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman saysStory # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges aheadStory # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial UseStory # 6: Data Exfil from Agents in Messaging AppsStory # 7: AMOS infostealer targets macOS through a popular AI appStory # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data BreachStory # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next monthStory # 10: SolarWinds Web Help Desk Exploitation - February 2026Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokersStory # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks01:01:00 - Eric’s Workshop01:01:31 - Jennifer’s Workshop01:04:37 - SOC Summit 2026Creators & Guests Corey Ham - Host Wade Wells - Host Bronwen Aker - Host Ralph May - Host Ched "cheddar" Wiggins - Guest Jennifer Shannon - Guest Eric Kuehn - Guest Click here to watch a video of this episode. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.

Feb 22, 20261h 7m

S6 Ep 6Live From WWHF Mile High 2026 – 2026-02-11

Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience. This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Corey Olympics (02:23) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features (07:42) - Story # 2: Discord will require a face scan or ID for full access next month (10:17) - Story # 3: 2026-01-14: The Day the telnet Died (15:04) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution (16:32) - Story # GRITREP: 0APT and the Victims Who Weren’t (20:54) - The advanced advancement of AI models Click here to watch a video of this episode. Creators & Guests John Strand - Host Corey Ham - Host Derek Banks - Guest Andrew Krug - Guest Chadd Watson - Guest Hayden Covington - Host Click here to view the episode transcript. LinksStory # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI featuresStory # 2: Discord will require a face scan or ID for full access next monthStory # 3: 2026-01-14: The Day the telnet DiedStory # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code ExecutionStory # GRITREP: 0APT and the Victims Who Weren’t🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Feb 18, 202633 min

S6 Ep 5US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatThis episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.Chapters(00:00) - PreShow Banter™ — Robot Drivers (06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02 (09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT (19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies (23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users (26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed (30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site (36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security (39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity (41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google (45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries (48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group (52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine (54:28) - Story # 12: Attack on Renewable Energy Plants (56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog LinksStory # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPTStory # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependenciesStory # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select UsersStory # 4: Millions of Gmail, Facebook and other account credentials exposedStory # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the SiteStory # 6: County pays $600,000 to pentesters it arrested for assessing courthouse securityStory # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodityStory # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of GoogleStory # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 CountriesStory # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware groupStory # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in UkraineStory # 12: Attack on Renewable Energy PlantsStory # 13: Disrupting the World’s Largest Residential Proxy Network | Google Cloud BlogWade & Hayden on Simply Cyber - https://www.youtube.com/live/c_lUP5gR15IHayden’s Class - https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/Mishaal’s Class - https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Feb 5, 20261h 4m

S6 Ep 4TikTok's invasive Privacy Policy - 2026-01-26

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatIn this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.Chapters:(00:00) - PreShow Banter™ — Electroshock Therapy (02:28) - 2026-01-26 (07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched (14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root (17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy (24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case (31:02) - Story # 5: Google accused of grooming kids after child receives this email (34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16 (35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work? (42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might) (48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites (52:09) - ClawdBot / Moltbot Links:Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patchedStory # 2: Hackers exploit critical telnetd auth bypass flaw to get rootStory # 3: Clara Hawking’s Post on TikTok’s Pivacy PolicyStory # 4: Supreme Court to hear Facebook pixel tracking caseStory # 5: Google accused of grooming kids after child receives this emailStory # 6: House of Lords backs legislation to ban social media for children under 16Story # 6b: Australia has banned social media for kids under 16. How does it work?Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)Story # 8: 1Password adds pop-up warnings for suspected phishing sitesClawdBot / MoltbotTroy’s WorkshopANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Jan 28, 20261h 3m

S6 Ep 3Chinese firms drop US and Israeli cybersecurity software - 2026-01-19

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comThis episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.Chapters(00:00) - PreShow Banter™ — Podcast Banter (04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19 (08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system (16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports (18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs. (20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment (27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe (29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes (41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations (49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow (55:29) - CTF Winners (59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims LinksStory # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources sayStory # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing systemStory # 3: Hacker gets seven years for breaching Rotterdam and Antwerp portsStory # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experimentStory # 6: Hungary grants asylum to former Polish minister implicated in spyware probeStory # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakesStory # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrationsStory # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNowChickenSec: KFC app ‘more secure’ than Manage My Health, expert claimsBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Jan 20, 20261h 3m

S6 Ep 2BreachForums Doomsday - 2026-01-12

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.comIn this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines.Chapters(00:00) - PreShow Banter™ — Task Overflow (02:29) - BreachForums Doomsday - 2026-01-12 (05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin? (15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS (23:04) - Story # 3: California bans data broker reselling health data of millions (28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year (36:00) - Story # 5: Ragebait as a phishing tactic (38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum (40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild (45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models (46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools (50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers (53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests (56:49) - Reporter remembers saving animals a year after L.A. wildfires (57:52) - CTF Winners LinksStory # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNSStory # 3: California bans data broker reselling health data of millionsStory # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this yearStory # 5: Ragebait as a phishing tacticStory # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web ForumStory # 7: The Great VM Escape: ESXi Exploitation in the WildStory # 8: OpenAI says ChatGPT won’t use your health information to train its modelsStory # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise toolsStory # 9: Max severity Ni8mare flaw lets hackers hijack n8n serversStory # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset RequestsReporter remembers saving animals a year after L.A. wildfiresBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Traininghttps://wildwesthackinfest.com

Jan 14, 20261h 1m

S6 Ep 1US Cyberattacks on Venezuela - 2026-01-05

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.comIn this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.Chapters(00:00) - PreShow Banter™ — Undisclosed Closets (09:07) - US Cyberattacks on Venezuela - 2026-01-05 (10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout (21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela (32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea (35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks (35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide (39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot (42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data" (42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe (43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage (47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices (52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline (55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras (57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras LinksStory # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikesStory # 1b: There Were BGP Anomalies During The Venezuela BlackoutStory # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes VenezuelaStory # 2: Finland seizes ship suspected of damaging subsea cable in Baltic SeaStory # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacksStory # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation WorldwideStory # 5: Hackers claim to hack Resecurity, firm says it was a honeypotStory # 6: NordVPN denies breach claims, says attackers have “dummy data”Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safeStory # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on StageStory # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devicesStory # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offlineStory # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance CamerasStory # 11b: We Tracked Ourselves with Exposed Flock CamerasBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Jan 9, 20261h 9m

S1 Ep 2Hot Take Predictions for Next Year – 2025-12-15

Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.comChapters(00:00) - PreShow Banter™ — testing testing (00:11) - Hot Take Predictions for Next Year – 2025-12-15 (02:10) - Story # 1: Russian kids revolt as Kremlin bans Roblox, other popular apps (10:21) - Story # 2: Google's killing off its dark web report because users didn't know what to do with it (20:05) - Story # 3: Coupang data breach traced to ex-employee who retained system access (31:13) - Story # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy (34:18) - Story # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated] (36:48) - Story # 6: When adversaries bring their own virtual machine for persistence (41:57) - Story # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++ (44:20) - Hot Take Predictions for 2026 LinksStory # 1: Russian kids revolt as Kremlin bans Roblox, other popular appsStory # 2: Google’s killing off its dark web report because users didn’t know what to do with itStory # 3: Coupang data breach traced to ex-employee who retained system accessStory # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcyStory # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]Story # 6: When adversaries bring their own virtual machine for persistenceStory # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++The team looks ahead to 2026 and shares practical, sometimes blunt predictions about where cybersecurity is heading. They discuss how AI will continue reshaping both offense and defense, with attackers using automation at scale while defenders struggle to operationalize AI beyond marketing hype. The conversation highlights growing risk from identity abuse, cloud misconfigurations, and insecure SaaS sprawl, noting that many breaches will still come down to basic failures rather than advanced exploits. They also predict continued burnout in security teams, more consolidation among security vendors, and increasing pressure to prove real ROI from security tools. On the positive side, the hosts see improved detection engineering, better security education, and more community-driven knowledge sharing. Overall, the message is clear: fundamentals still matter, hype won’t save you, and organizations that focus on people, process, and visibility will be better positioned for 2026.Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Dec 18, 20251h 2m

S1 Ep 1A Live Stream From inside Lazarus Group – 2025-12-08

🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comJoin us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord!https://discord.gg/bhis🔴live-chatA Live Stream From inside Lazarus Group – 2025-12-08This BHIS episode blends cybersecurity humor, hacker culture, and livestream chaos as the team jokes about nation-state threats, leaked webcams, OPSEC mishaps, and technical glitches. With unscripted banter and light industry insights, it’s a fun, energetic listen for fans of ethical hacking, infosec podcasts, and behind-the-scenes security chatter.Chapters00:00 - PreShow Banter™ — Industry Leaders02:34 - A Live Stream From inside Lazarus Group – 2025-12-0804:24 - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability08:58 - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme20:37 - Story # 3: Contractors with hacking records accused of wiping 96 govt databases26:44 - Story # 4: Apple refuses to pre-install government app on iPhones in India37:42 - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms44:55 - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted57:53 - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AIBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com (00:00) - 00:00 - PreShow Banter™ — Industry Leaders (02:34) - A Live Stream From inside Lazarus Group – 2025-12-08 (04:24) - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability (08:57) - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme (20:37) - Story # 3: Contractors with hacking records accused of wiping 96 govt databases (26:44) - Story # 4: Apple refuses to pre-install government app on iPhones in India (37:41) - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms (44:55) - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted (57:52) - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI

Dec 11, 20251h 3m

Ep 1Lawmakers Want to Ban VPNs - 2025-12-01

Register for FREE Infosec Webcasts, Anti-casts & Summits –https://poweredbybhis.comChapters(00:00) - PreShow Banter™ — The Problem With Extensions (03:10) - Lawmakers Want to Ban VPNs – BHIS - Talkin' Bout [infosec] News 2025-12-01 (03:47) - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem) (12:05) - Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing (21:18) - Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update (25:48) - Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022 (37:07) - Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says (39:10) - Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now (42:38) - Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show (50:22) - Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims (52:40) - Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison News LinksStory # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're DoingStory # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual UpdateStory # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert SaysStory # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act NowStory # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents showStory # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claimsStory # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prisonBrought to you by: Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com

Dec 4, 20251h 2m

Ep 1Shai-Hulud malware leaks secrets on GitHub – 2025-11-24

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comChapters(00:00) - PreShow Banter™ — Stressed about lithium batteries (04:59) - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-11-24 (05:57) - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub (11:18) - Story # 2: CrowdStrike catches insider feeding information to hackers (15:50) - Story # 3: Fidelity sues Broadcom over access to key software to avoid outages (22:17) - Story # 4: NetApp sues former CTO for alleged data breach (26:48) - Story # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers (36:05) - Story # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now (37:11) - Story # 6b: Cloudflare outage on November 18, 2025 (41:43) - Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt (46:34) - Story # 8: This Hacker Conference Installed a Literal Antivirus Monitoring System (51:10) - Story # 9: Microsoft to integrate Sysmon directly into Windows 11, Server 2025 (56:40) - Story # 10: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist News LinksStory # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHubStory # 2: CrowdStrike catches insider feeding information to hackersStory # 3: Fidelity sues Broadcom over access to key software to avoid outagesStory # 4: NetApp sues former CTO for alleged data breachStory # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political TriggersStory # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered nowStory # 6b: Cloudflare outage on November 18, 2025Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike AttemptStory # 8: This Hacker Conference Installed a Literal Antivirus Monitoring SystemStory # 9: Microsoft to integrate Sysmon directly into Windows 11, Server 2025Story # 10: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey HeistBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/

Nov 26, 20251h 5m

Ep 1A.I. Transcription Startup Was Just A Guy Taking Notes- 2025-11-17

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — The Way the Community Rumbles00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-11-1700:09:01 - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations00:18:06 - Eric & Whitney’s “Podcast” [webcast] on training your own LLM00:22:12 - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand00:26:20 - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies00:37:35 - Story # 4: Google is easing up on Android’s new sideloading restrictions!00:43:44 - Story # 5: Google is collecting troves of data from downgraded Nest thermostats00:44:58 - Story # 5b: Hackers are saving Google’s abandoned Nest thermostats with open-source firmware00:51:34 - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs01:00:40 - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead01:05:55 - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign01:14:58 - Discord CTF Winners (00:00) - PreShow Banter™ — The Way the Community Rumbles (08:21) - A.I. Transcription Starup Was Just A Guy Taking Notes - BHIS - Talkin' Bout [infosec] News 2025-11-17 (09:01) - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations (18:05) - Eric & Whitney's "Podcast" [webcast] on training your own LLM (22:12) - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand (26:20) - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies (37:34) - Story # 4: Google is easing up on Android's new sideloading restrictions! (43:43) - Story # 5: Google is collecting troves of data from downgraded Nest thermostats (44:58) - Story # 5b: Hackers are saving Google's abandoned Nest thermostats with open-source firmware (51:33) - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs (01:00:39) - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead (01:05:55) - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign (01:14:58) - Discord CTF Winners

Nov 21, 20251h 16m

Ep 1Louvre’s Video Security Password Was ‘Louvre’ 2025-11-10

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Chapters00:00 - PreShow Banter™ — Humans are Done03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-1005:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.15:14 - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell25:14 - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’29:04 - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers32:58 - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities40:00 - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools56:37 - BHIS Webcast – X-Typhoon - Not your Father’s China with John Strand (00:00) - PreShow Banter™ — Humans are Done (03:03) - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin' Bout [infosec] News 2025-11-10 (05:10) - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human. (15:14) - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell (25:13) - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’ (29:03) - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers (32:58) - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities (40:00) - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools (56:37) - BHIS Webcast – X-Typhoon - Not your Father's China with John Strand

Nov 13, 202558 min

Ep 1Ransomware Victims Stop Paying Hackers – 2025-11-03

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Musical Views of the Universe04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-0304:39 - Story # 1: Ransomware profits drop as victims stop paying hackers06:22 - Chart since 201916:06 - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates33:02 - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.41:18 - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]47:13 - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says51:08 - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services54:33 - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure55:22 - Stordy # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity (00:00) - PreShow Banter™ — Musical Views of the Universe (04:04) - Ransomware Victims Stop Paying Hackers – BHIS - Talkin' Bout [infosec] News 2025-11-03 (04:38) - Story # 1: Ransomware profits drop as victims stop paying hackers (06:22) - Chart since 2019 (thumbnail) (16:06) - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates (33:02) - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. (41:18) - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored] (47:12) - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (51:07) - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services (54:33) - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure (55:22) - Story # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

Nov 6, 20251h 3m

Ep 1The AI Browser Wars - 2025-10-27

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comThe BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights you can actually use. Whether it’s social engineering, AI-powered attacks, or bizarre security headlines, we dig into what matters most for defenders and curious minds alike. Stay informed, entertained, and one step ahead in the ever-changing world of infosec.00:00:00 - PreShow Banter™ — The Cost of War.xyz00:03:42 - The AI Browser Wars - BHIS - Talkin’ Bout [infosec] News 2025-10-2700:04:04 - Story # 1: Smart bed owners experience AWS outage nightmare as they’re left sweating and stuck in upright position00:10:49 - Story # 2: Robots May Replace 600,000 Human Employees at Amazon00:14:40 - Story # 3: Meet Mico, Microsoft’s AI version of Clippy00:20:59 - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability00:26:31 - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia00:31:29 - Story # 6: Introducing ChatGPT Atlas00:43:34 - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users00:52:26 - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn01:00:16 - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed (00:00) - PreShow Banter™ — The Cost of War.xyz (03:42) - The AI Browser Wars - BHIS - Talkin' Bout [infosec] News 2025-10-27 (04:04) - Story # 1: Smart bed owners experience AWS outage nightmare as they're left sweating and stuck in upright position (10:48) - Story # 2: Robots May Replace 600,000 Human Employees at Amazon (14:40) - Story # 3: Meet Mico, Microsoft’s AI version of Clippy (20:58) - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (26:30) - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia (31:28) - Story # 6: Introducing ChatGPT Atlas (43:34) - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users (52:25) - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn (01:00:15) - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed

Oct 31, 20251h 1m

Ep 1Online Book Store Takes Down Half the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — AWS Snow Day Party00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-2000:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code00:35:11 - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood00:48:39 - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space00:55:04 - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space01:02:22 - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies (00:00) - PreShow Banter™ — AWS Snow Day Party (11:30) - Online Book Store Takes Down Half of the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20 (12:12) - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code (35:10) - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood (48:39) - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space (55:03) - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space (01:02:21) - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies

Oct 24, 20251h 8m

Ep 1Hackers claim Discord breach exposed data of 5.5 million users - 2025-10-13

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — A Real Podcast03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-1305:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users36:52 - Story # 3: Velociraptor leveraged in ransomware attacks46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise54:48 - CTF Challenge (00:00) - PreShow Banter™ — A Real Podcast (03:14) - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-13 (05:43) - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code (24:26) - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users (36:52) - Story # 3: Velociraptor leveraged in ransomware attacks (46:46) - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise (54:48) - CTF Challenge

Oct 18, 202558 min

Ep 12 Million Cisco Devices Targeted by Exploited 0-Day – 2025-09-29

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — A little radiation never hurt anybody.03:07 - BHIS - Talkin’ Bout [infosec] News 2025-09-2903:29 - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day19:07 - Story # 2: Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts | TechCrunch24:25 - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human29:32 - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed34:14 - Story # 5: ‘You’ll never need to work again’: Criminals offer reporter money to hack BBC38:18 - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams46:48 - Mini CTF Walkthrough56:03 - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area (00:00) - PreShow Banter™ — A little radiation never hurt anybody. (03:07) - BHIS - Talkin' Bout [infosec] News 2025-09-29 (03:28) - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day (19:06) - Story # 2: Viral call-recording app Neon goes dark after exposing users' phone numbers, call recordings, and transcripts | TechCrunch (24:24) - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human (29:31) - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed (34:14) - Story # 5: 'You'll never need to work again': Criminals offer reporter money to hack BBC (38:18) - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams (46:48) - Mini CTF Walkthrough (56:02) - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area

Oct 2, 20251h 1m

Ep 1Dirk-Jan Mollema Walks Us Through the Entra ID Cross-Tenant Vulnerability Discovery– 2025-09-22

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Unnatural European Fridges03:34 - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin’ Bout [infosec] News 2025-09-2204:14 - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens21:32 - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages40:50 - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence51:41 - Story # 3: Verified Steam game steals streamer’s cancer treatment donations57:16 - Story # 4: Heathrow warns of second day of disruption after cyber-attack (00:00) - PreShow Banter™ — Unnatural European Fridges (03:07) - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin' Bout [infosec] News 2025-09-22 (03:45) - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens (20:09) - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages (38:51) - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence (49:28) - Story # 3: Verified Steam game steals streamer's cancer treatment donations (54:51) - Story # 4: Heathrow warns of second day of disruption after cyber-attack

Sep 25, 20251h 0m

Ep 1Kerberoasting Goes to Washington – 2025-09-15

???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”12:46 - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy’ due to hack crisis41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program49:55 - Story # 6: Qantas penalizes executives for July cyberattack51:15 - Story # 7: America’s second largest egg producer breached, claim hackers54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices (00:00) - PreShow Banter™ — Enter Dark John (03:14) - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-15 (03:49) - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” (12:46) - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations (32:41) - Story # 3: Some JLR suppliers 'face bankruptcy' due to hack crisis (41:29) - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns (46:06) - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program (49:54) - Story # 6: Qantas penalizes executives for July cyberattack (51:14) - Story # 7: America’s second largest egg producer breached, claim hackers (54:55) - Story # 8: Undocumented Radios Found in Solar-Powered Devices

Sep 20, 20251h 2m

Ep 1Anthropic 1.5 Billion © Settlement - 2025-09-08

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — If I Were French04:35 - Anthropic 1.5 Billion © Settlement - BHIS - Talkin’ Bout [infosec] News 2025-09-0805:48 - Hackers Threaten to Submit Artists’ Data to AI Models If Art Site Doesn’t Pay Up08:40 - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement23:58 - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In33:38 - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps40:07 - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack44:27 - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack46:38 - Update on Mandiant Drift and Salesloft Application Investigations51:04 - M&S hackers claim to be behind Jaguar Land Rover cyber attack51:55 - New TP-Link zero-day surfaces as CISA warns other flaws are exploited54:52 - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy57:58 - Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions (00:00) - PreShow Banter™ — If I Were French (04:35) - Anthropic 1.5 Billion © Settlement - BHIS - Talkin' Bout [infosec] News 2025-09-08 (05:47) - Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up (08:40) - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement (23:57) - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In (33:38) - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps (40:07) - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack (44:26) - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack (46:37) - Update on Mandiant Drift and Salesloft Application Investigations (51:03) - M&S hackers claim to be behind Jaguar Land Rover cyber attack (51:54) - New TP-Link zero-day surfaces as CISA warns other flaws are exploited (54:52) - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy (57:57) - Cybercriminals Exploit X's Grok AI to Bypass Ad Protections and Spread Malware to Millions

Sep 10, 202559 min

Ep 1Chinese agent tried to recruit Stanford Student - 2025-09-02

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — It’s 8ft skeleton season.02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-0203:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 202522:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-842425:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI35:20 - Story # 12: They weren’t lovin’ it - hacker cracks McDonald’s security in quest for free nuggets, and it was apparently not too tricky39:29 - Identify the birds you see or hear with Merlin Bird ID40:04 - Story # 13: Detecting and countering misuse of AI: August 202551:31 - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy (00:00) - PreShow Banter™ — It’s 8ft skeleton season. (02:17) - BHIS - Talkin' Bout [infosec] News 2025-09-02 (03:07) - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks (07:35) - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ (13:46) - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling (17:44) - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K (19:39) - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’ (20:56) - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025 (22:43) - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 (25:19) - Story # 8: First known AI-powered ransomware uncovered by ESET Research (30:00) - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception (32:05) - Story # 10: TransUnion suffers data breach impacting over 4.4 million people (34:16) - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI (35:20) - Story # 12: They weren't lovin' it - hacker cracks McDonald's security in quest for free nuggets, and it was apparently not too tricky (39:29) - Identify the birds you see or hear with Merlin Bird ID (40:03) - Story # 13: Detecting and countering misuse of AI: August 2025 (51:31) - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy

Sep 6, 202556 min

Ep 1The Impending AI Bubble 2025-08-25

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Canadian Chicken02:01 - The AI Bubble BHIS - Talkin’ Bout [infosec] News 2025-08-2502:23 - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers09:27 - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years12:43 - Story # 3: Developer jailed for taking down employer’s network with kill switch malware16:33 - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet20:42 - The Utopia Chronicles23:20 - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic28:47 - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says41:21 - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes43:41 - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You46:33 - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices49:24 - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions53:12 - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds59:07 - ChickenSec: Artificial Intelligence: The other AI (00:00) - PreShow Banter™ — Canadian Chicken (02:01) - The AI Bubble BHIS - Talkin' Bout [infosec] News 2025-08-25 (02:23) - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers (09:27) - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years (12:42) - Story # 3: Developer jailed for taking down employer's network with kill switch malware (16:33) - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet (20:41) - The Utopia Chronicles (23:20) - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic (28:46) - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says (41:21) - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes (43:41) - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You (46:33) - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices (49:24) - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions (53:12) - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds (59:06) - ChickenSec: Artificial Intelligence: The other AI

Aug 30, 20251h 4m

Ep 1Cyberattack Bricks Speed Cameras – 2025-08-18

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-1802:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say10:22 - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks24:51 - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild48:13 - Story # 14: Plex warns users to patch security vulnerability immediately50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm (00:00) - PreShow Banter™ — The gif that keeps on giffing (01:46) - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-18 (02:38) - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny (07:16) - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say (10:22) - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes (12:16) - Story # 4: Cisco discloses maximum-severity defect in firewall software (13:55) - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities (19:13) - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely (23:30) - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks (24:51) - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds (29:04) - Story # 9: Manpower discloses data breach affecting nearly 145,000 people (34:50) - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum (35:34) - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived (40:53) - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/” (46:27) - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild (48:13) - Story # 14: Plex warns users to patch security vulnerability immediately (50:52) - ChickenSec: Noble Foods using soil mapping technology at organic egg farm

Aug 20, 202558 min

Ep 1DEF CON RECAP – 2025-08-11

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin’ Bout [infosec] News 2025-08-1109:16 - Story # 1: It’s time to acknowledge HTTP/1.1 is insecure12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling17:51 - Story # 3: Federal court filing system hit in sweeping hack21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities34:20 - Story # 6: Automate security reviews with Claude Code39:01 - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside47:12 - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks (00:00) - PreShow Banter™ — Wading Through Woods (06:06) - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-11 (09:15) - Story # 1: It's time to acknowledge HTTP/1.1 is insecure (12:36) - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling (17:50) - Story # 3: Federal court filing system hit in sweeping hack (21:08) - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts (32:16) - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities (34:20) - Story # 6: Automate security reviews with Claude Code (39:00) - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands (44:43) - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside (47:11) - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake (49:36) - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code (50:52) - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools (53:08) - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT (58:09) - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks

Aug 14, 202559 min

Ep 1Perplexity Stealth Crawlers Evade No-Crawl Directives - 2025-08-04

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he’s in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won’t cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade’s plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What’s Ralph been up to? (00:00) - PreShow Banter™ — Stop Asking Wade if he's in Vegas (02:16) - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-04 (11:25) - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security (18:39) - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation (26:44) - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations (34:18) - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins (40:09) - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons (42:17) - Wade’s plugin recommendation (44:38) - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives (51:10) - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google (55:20) - AI 2027 (01:01:00) - What’s Ralph been up to?

Aug 7, 20251h 3m

Ep 1UK Bans Ransomware Payments - 2025-07-28

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — National Chicken Wing Day04:16 - BHIS - Talkin’ Bout [infosec] News 2025-07-2805:30 - Story # 1: Bad vibes: How an AI agent coded its way to disaster08:40 - Story # 1b: Replit goes rogue, deletes entire database.15:44 - Story # 2: A major AI training data set contains millions of examples of personal data26:05 - Story # 3: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted to 4chan33:19 - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors40:28 - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers49:46 - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime57:38 - SharePoint Follow Up (00:00) - PreShow Banter™ — National Chicken Wing Day (04:15) - BHIS - Talkin' Bout [infosec] News 2025-07-28 (05:29) - Story # 1: Bad vibes: How an AI agent coded its way to disaster (08:39) - Story # 1b: Replit goes rogue, deletes entire database. (15:43) - Story # 2: A major AI training data set contains millions of examples of personal data (26:04) - Story # 3: Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan (33:18) - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors (40:27) - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers (49:46) - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime (57:38) - SharePoint Follow Up

Aug 1, 20251h 2m

Ep 1Microsoft's OverSharePoint 0-Day Exploit – 2025-07-21

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — PaintBallers03:55 - BHIS - Talkin’ Bout [infosec] News 2025-07-2104:21 - Story # 1: Microsoft 0-day Mass Exploitation09:39 - Story # 2: Replit AI went rogue, deleted a company’s entire database, then hid it and lied about it13:15 - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach18:08 - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected20:45 - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case21:54 - Story # 5b: FBI’s Report29:57 - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome31:30 - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns32:33 - Story # 8: CitrixBleed 2 situation update — everybody already got owned33:01 - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds46:14 - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral48:56 - jdbgmgr.exe virus hoax51:52 - Story # 11: HPE warns of hardcoded passwords in Aruba access points (00:00) - PreShow Banter™ — PaintBallers (03:55) - BHIS - Talkin' Bout [infosec] News 2025-07-21 (04:20) - Story # 1: Microsoft 0-day Mass Exploitation (09:39) - Story # 2: Replit AI went rogue, deleted a company's entire database, then hid it and lied about it (13:14) - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach (18:08) - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected (20:44) - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case (21:53) - Story # 5b: FBI's Report (29:56) - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome (31:30) - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns (32:32) - Story # 8: CitrixBleed 2 situation update — everybody already got owned (33:00) - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds (46:14) - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral (48:55) - jdbgmgr.exe virus hoax (51:52) - Story # 11: HPE warns of hardcoded passwords in Aruba access points

Jul 23, 20251h 4m

Ep 1McDonald’s Over 64 Million Exposed Job Applicants - 2025-07-14

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Traditional Finger00:21 - BHIS - Talkin’ Bout [infosec] News 2025-07-1401:29 - Story # 1: ‘123456’ password exposed chats for 64 million McDonald’s job chatbot applications22:12 - Story # 2: Employee gets $920 for credentials used in $140 million bank heist33:50 - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts37:21 - Story # 5: Scammy YouTube Ads46:31 - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data (00:00) - PreShow Banter™ — Traditional Finger (00:21) - BHIS - Talkin' Bout [infosec] News 2025-07-14 (01:28) - Story # 1: '123456' password exposed chats for 64 million McDonald’s job chatbot applications (22:12) - Story # 2: Employee gets $920 for credentials used in $140 million bank heist (33:50) - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts (37:20) - Story # 5: Scammy YouTube Ads (46:31) - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data

Jul 16, 202555 min

Ep 1North Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Pre Stream Appropriate03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-0705:41 - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats20:01 - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations25:49 - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say34:47 - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild42:15 - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling46:58 - Story # 4: Ingram Micro outage caused by SafePay ransomware attack49:45 - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores53:13 - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it’s infested with RCE hackers — I’d take cover and avoid playing until there’s a fix (00:00) - PreShow Banter™ — Pre Stream Appropriate (03:39) - N. Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07 (05:40) - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats (20:00) - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations (25:49) - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say (34:47) - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild (42:14) - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling (46:58) - Story # 4: Ingram Micro outage caused by SafePay ransomware attack (49:44) - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores (53:13) - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it's infested with RCE hackers — I'd take cover and avoid playing until there's a fix

Jul 9, 202555 min

Ep 1Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30

Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comChapters:00:00 - PreShow Banter™ — Names on Cups01:39 - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin’ Bout [infosec] News 2025-06-3003:34 - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.10:55 - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails14:07 - Story # 3: The year of the European Union Linux desktop may finally arrive24:46 - Story # 4: Restricted data once again leaked on War Thunder forums27:04 - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices31:47 - Story # 6: French police reportedly arrest suspected BreachForums administrators34:22 - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages39:41 - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–577742:16 - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug47:05 - Story # 10: Canada orders China’s Hikvision to close Canadian operations50:13 - Story # 11: US House bans WhatsApp on staff devices over security concerns53:17 - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO56:34 - Story # 12: Norway Dam Hacked, Valve Opened But No Danger58:11 - Review your calendar invites! (00:00) - PreShow Banter™ — Names on Cups (01:38) - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30 (03:33) - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now. (10:55) - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails (14:07) - Story # 3: The year of the European Union Linux desktop may finally arrive (24:45) - Story # 4: Restricted data once again leaked on War Thunder forums (27:03) - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices (31:46) - Story # 6: French police reportedly arrest suspected BreachForums administrators (34:21) - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages (39:40) - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–5777 (42:16) - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug (47:05) - Story # 10: Canada orders China's Hikvision to close Canadian operations (50:12) - Story # 11: US House bans WhatsApp on staff devices over security concerns (53:16) - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO (56:33) - Story # 12: Norway Dam Hacked, Valve Opened But No Danger (58:11) - Review your calendar invites!

Jul 4, 202559 min

Ep 1Iran Shuts Down It's Own Internet - 2025-06-23

Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Explaining the Muppets03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-2304:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks20:20 - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’22:11 - Story # 3: Hackers switch to targeting U.S. insurance companies23:32 - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)33:33 - Story # 4: No, the 16 billion credentials leak is not a new data breach43:23 - Story # 5: ‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories47:09 - Story # 6: CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM48:49 - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations58:29 - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says (00:00) - PreShow Banter™ — Explaining the Muppets (03:08) - Iran Shuts Down It's Own Internet - BHIS - Talkin' Bout [infosec] News 2025-06-23 (04:52) - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks (20:19) - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’ (22:11) - Story # 3: Hackers switch to targeting U.S. insurance companies (23:31) - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23) (33:32) - Story # 4: No, the 16 billion credentials leak is not a new data breach (43:22) - Story # 5: 'Water Curse' Targets Infosec Pros via Poisoned GitHub Repositories (47:09) - Story # 6: CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM (48:48) - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations (58:29) - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says

Jun 26, 20251h 5m

Ep 1Denmark is Done with Teams! - 2025-06-16

Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Government Linux04:16 - Denmark is Done with Teams! - Talkin’ Bout [infosec] News 2025-06-1605:02 - Story # 1: ‘We’re done with Teams’: German state hits uninstall on Microsoft17:34 - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice18:14 - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot25:50 - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks30:25 - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks34:00 - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems40:25 - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability44:47 - Story # 7: Google Cloud and Cloudflare hit by widespread service outages48:04 - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo50:34 - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques51:08 - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds53:32 - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud (00:00) - PreShow Banter™ — Government Linux (04:15) - Denmark is Done with Teams! - Talkin' Bout [infosec] News 2025-06-16 (05:02) - Story # 1: 'We're done with Teams': German state hits uninstall on Microsoft (17:33) - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice (18:14) - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot (25:49) - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks (30:24) - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks (33:59) - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems (40:25) - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability (44:47) - Story # 7: Google Cloud and Cloudflare hit by widespread service outages (48:03) - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo (50:33) - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques (51:08) - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds (53:31) - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Jun 18, 202556 min

Ep 1Chatbot Tells Addict to Take Drugs - 2025-06-09

Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Time to Bake05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-0606:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat16:11 - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion26:56 - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks27:40 - Story # 4b: ConnectWise email35:28 - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI39:27 - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser52:20 - Story # 7: Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America (00:00) - PreShow Banter™ — Time to Bake (05:12) - Chatbot Tells Addict to Take Drugs - Talkin' Bout [infosec] News 2025-05-06 (06:08) - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers (12:55) - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat (16:11) - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion (26:56) - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks (27:40) - Story # 4b: ConnectWise email (35:27) - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI (39:26) - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser (52:19) - Story # 7: Trump cyber executive order takes aim at prior orders, secure software, identity

Jun 12, 20251h 0m

Ep 1Victoria’s Secrets are Compromised - 2025-06-02

Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — natural MSG05:31 - Victoria’s Secrets are Compromised - Talkin’ Bout [infosec] News 2025-06-0206:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info40:12 - Story # 8: Victoria’s Secret takes down website after security incident45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names46:59 - Story # 10: Zscaler Acquisition of Red Canary49:57 - Story # 11: Most of CISA’s senior leaders are leaving the agency51:22 - Story # 12: Telegram announces partnership with Musk’s xAI51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware (00:00) - PreShow Banter™ — natural MSG (05:31) - BHIS - Talkin' Bout [infosec] News 2025-06-02 (06:31) - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels (08:36) - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend (09:40) - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live (10:47) - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns (15:55) - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online (20:28) - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents (21:02) - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube) (26:55) - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot (27:27) - Story # 4b: Reeves confirms 15% cut to Civil Service running costs (29:28) - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted (31:27) - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors. (35:33) - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers (36:18) - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info (40:12) - Story # 8: Victoria’s Secret takes down website after security incident (45:42) - Story # 9: Microsoft and CrowdStrike partner to link hacking group names (46:59) - Story # 10: Zscaler Acquisition of Red Canary (49:57) - Story # 11: Most of CISA’s senior leaders are leaving the agency (51:21) - Story # 12: Telegram announces partnership with Musk's xAI (51:32) - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware

Jun 5, 202554 min

Ep 1Blackmailing A.I. - 2025-05-27

Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — I just want Jorts!05:42 - Blackmailing A.I. - Talkin’ Bout [infosec] News 2025-05-2707:01 - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons11:29 - Story # 2: How a global malware operation was taken down from a federal court in Georgia13:50 - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action15:23 - Marker 1719:25 - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline32:19 - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more34:53 - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks36:57 - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now40:56 - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 1143:16 - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords44:54 - Story # 10: Google Chrome’s Built-in Manager Lets Users Update Breached Passwords with One Click48:09 - Story # 11: Russian military hackers ‘Fancy Bear’ target Western aid supply chains to Ukraine, NSA report says50:13 - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo54:17 - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales56:55 - Story # 13b: [HOPE_16] International Travel Tips (00:00) - PreShow Banter™ — I just want Jorts! (05:41) - Blackmailing A.I. - Talkin' Bout [infosec] News 2025-05-27 (07:00) - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons (11:28) - Story # 2: How a global malware operation was taken down from a federal court in Georgia (13:49) - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action (19:24) - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline (32:18) - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more (34:53) - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks (36:57) - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now (40:56) - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 11 (43:16) - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords (44:53) - Story # 10: Google Chrome's Built-in Manager Lets Users Update Breached Passwords with One Click (48:08) - Story # 11: Russian military hackers 'Fancy Bear' target Western aid supply chains to Ukraine, NSA report says (50:13) - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo (54:17) - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales (56:54) - Story # 13b: [HOPE_16] International Travel Tips

May 30, 202558 min

Ep 1WORLDS FIRST CPU Ransomware! - 2025-05-19

Register for Free, Live webcasts & summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Twiddle Me This02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-1903:10 - Story # 1: Coinbase - Standing Up to Extortionists11:26 - Story # 2: World’s first CPU-level ransomware15:09 - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory19:04 - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable21:39 - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms27:52 - Story # 6: Congress proposes 10-year ban on state AI regulations31:41 - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data36:02 - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos37:32 - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.40:06 - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google41:11 - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes43:08 - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage’s archive server47:12 - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters51:20 - Story # 12: Education giant Pearson hit by cyberattack exposing customer data (00:00) - PreShow Banter™ — Twiddle Me This (02:03) - WORLDS FIRST CPU Ransomware! - Talkin' Bout [infosec] News 2025-05-19 (03:10) - Story # 1: Coinbase - Standing Up to Extortionists (11:25) - Story # 2: World's first CPU-level ransomware (15:09) - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory (19:03) - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable (21:38) - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms (27:52) - Story # 6: Congress proposes 10-year ban on state AI regulations (31:41) - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data (36:01) - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos (37:32) - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now. (40:06) - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google (41:10) - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes (43:08) - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server (47:12) - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters (51:20) - Story # 12: Education giant Pearson hit by cyberattack exposing customer data

May 21, 202553 min

Ep 1Inside DragonForce 2025-05-12

Register for Free, Live webcasts & summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Crime is bad00:18 - dangerous trend of destroying Chromebooks04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-1205:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed06:36 - Story # 1b: https://ransomch.at09:31 - Story # 2: White House Proposes $500 Million Cut to CISA10:35 - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications18:09 - Story # 3: Inside DragonForce, the Group Tied to M&S, Co-op and Harrods Hacks22:28 - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts26:28 - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions32:20 - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online34:37 - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted36:33 - Story # 8: How a new type of AI is helping police skirt facial recognition bans48:38 - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware51:33 - Story # 10: A Framework to Report AI’s Flaws53:42 - Story # 10b: MITRE ATLAS™54:49 - Simply Hot Ones Challenge | LIVE FIRE SPICE (00:00) - PreShow Banter™ — Crime is bad (00:18) - dangerous trend of destroying Chromebooks (04:32) - BHIS - Talkin' Bout [infosec] News 2025-05-12 (05:39) - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed (06:36) - Story # 1b: https://ransomch.at (09:31) - Story # 2: White House Proposes $500 Million Cut to CISA (10:35) - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications (18:08) - Story # 3: Inside DragonForce, the Group Tied to M&S, Co-op and Harrods Hacks (22:28) - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts (26:28) - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions (32:20) - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online (34:37) - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted (36:33) - Story # 8: How a new type of AI is helping police skirt facial recognition bans (48:37) - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware (51:32) - Story # 10: A Framework to Report AI’s Flaws (53:42) - Story # 10b: MITRE ATLAS™ (54:48) - Simply Hot Ones Challenge | LIVE FIRE SPICE 🔥 and CYBER

May 15, 202556 min