Cybersecurity Today Podcast Por Jim Love capa

Cybersecurity Today

Cybersecurity Today

De: Jim Love
Ouça grátis

Sobre este áudio

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time. Política e Governo
Episódios
  • Cybersecurity Threats and Trends: From North Korean Spies to AI-Driven Attacks
    Aug 6 2025

    In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large language models to autonomously execute cyber attacks, a vulnerability in the AI-powered code editor Cursor allowing silent RCE attacks, and the rise of malicious Progressive Web Apps targeting mobile users. The show also discusses the risks associated with clicking unsubscribe links in spam emails. Listeners are encouraged to support the show and contribute through the website.

    00:00 Introduction and Summer Reading Request
    00:59 North Korean Spies in US Tech Firms
    03:25 AI's Role in Cyber Attacks
    05:18 Critical Vulnerability in AI Code Editor
    07:36 Malicious Mobile Browser Hijacks
    09:30 Unsubscribe Links as Phishing Traps
    10:50 Conclusion and Listener Engagement

    Exibir mais Exibir menos
    12 minutos
  • Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats
    Aug 4 2025

    In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powered Code Editor 'Cursor', which could allow prompt injection attacks. Further topics include a new ransomware attack exploiting Microsoft SharePoint vulnerabilities investigated by Palo Alto Networks, and a campaign leveraging fake OAuth apps to compromise Microsoft 365 accounts. The episode underscores the importance of robust security measures, emphasizing MFA, OAuth hygiene, and prompt patching.

    00:00 Introduction and Headlines
    00:38 Hamilton's Ransomware Attack and Insurance Denial
    02:52 AI-Powered Code Editor Vulnerability
    04:57 Palo Alto Networks Investigates SharePoint Exploitation
    06:51 Fake OAuth Apps and Microsoft 365 Breaches
    08:48 Conclusion and Upcoming Events

    Exibir mais Exibir menos
    10 minutos
  • Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts
    Aug 2 2025

    This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges law enforcement faces in combating such crimes. They discuss the effectiveness of public-private partnerships, the importance of victim-centric approaches, and emerging fraud trends such as investment scams and bank imposter scams. The episode emphasizes the critical role of education, awareness, and reporting in preventing and mitigating the impact of these cyber frauds.

    00:00 Introduction to the Grandparent Scam
    00:37 The Emotional and Financial Impact on Victims
    01:26 Fighting Back: The Role of Law Enforcement
    02:38 Meet the Experts: Deirdre's Journey
    04:44 Meet the Experts: John's Journey
    06:35 The Global Scale of Cyber Fraud
    08:11 Challenges in Handling Individual Fraud Cases
    10:24 Community-Based Approaches to Support Victims
    14:37 The Sophistication of Modern Scams
    20:57 The Grandparent Scam: A Detailed Breakdown
    28:01 Understanding Social Engineering
    28:19 Cybersecurity Conversations with Vulnerable Populations
    28:50 Fraud Prevention Initiatives
    31:07 Challenges in Communicating Cybersecurity
    32:35 Emerging Fraud Trends
    35:35 The Importance of Reporting Fraud
    37:53 Future Threats and Scams
    40:58 The Role of Public-Private Partnerships
    41:46 Final Thoughts and Next Steps

    Exibir mais Exibir menos
    51 minutos
Ainda não há avaliações