PodcastsEconomía y empresaCybersecurity Today

Cybersecurity Today

Jim Love
Cybersecurity Today
Último episodio

427 episodios

  • Cybersecurity Today

    Windows 11 BitLocker Zero-Day, TeamPCP Malware Leak, Iran Gas Station Hacks | Cybersecurity Today

    20/05/2026 | 13 min
    A serious new Windows 11 BitLocker vulnerability, open-sourced offensive malware tools, a suspected Iranian cyber campaign targeting U.S. fuel infrastructure, and malware that appears designed to interfere with nuclear weapons simulation systems.
     Cybersecurity Today would like to thank Material Security for sponsoring this podcast. Material Security provides faster, more complete detection and response for email, identity, and data threats inside Google Workspace and Microsoft 365. You can contact them at material[dot]security.
    David Shipley breaks down four major cybersecurity stories on Cybersecurity Today. First, a newly disclosed zero-day dubbed YellowKey reportedly defeats default Windows 11 BitLocker protection on systems using TPM-only encryption, giving attackers with physical access a path to unencrypted data through the Windows Recovery Environment. Microsoft is investigating, while security experts are urging stronger BitLocker configurations.
    The episode also examines the TeamPCP threat group's decision to release offensive tooling publicly, dramatically lowering the barrier for copycat supply-chain attacks. Researchers have already spotted malicious NPM packages borrowing similar techniques, including persistence mechanisms aimed at developer environments such as Visual Studio Code and Claude Code.
    David also looks at disturbing analysis of the FAST16 malware, which researchers believe was engineered to tamper with nuclear weapons simulation software including LS-DYNA and AutoDyn. And finally, U.S. officials reportedly suspect Iranian actors in cyberattacks targeting internet-exposed gas station automatic tank gauge systems, a reminder that weak operational technology security can quickly become a real-world infrastructure problem.
    00:00 Sponsor Message
    00:24 Headlines Overview
    00:50 BitLocker Zero Day
    03:32 TeamPCP Tools Leak
    06:13 Copycat NPM Malware
    06:50 Fast16 Nuclear Sabotage
    08:37 Iran Gas Station Hacks
    10:28 Hardening Critical Infrastructure
    11:16 Wrap Up And Events
    11:59 Sponsor Deep Dive
    #Cybersecurity #Windows11 #BitLocker #ZeroDay #TeamPCP #IranCyberAttack #SupplyChainAttack #CriticalInfrastructure #CyberSecurityToday
  • Cybersecurity Today

    Exchange Zero-Day Under Attack, Ransomware Gets Smarter, Fortinet Critical Flaws

    19/05/2026 | 12 min
    A dangerous new Microsoft Exchange zero-day is being actively exploited, ransomware gangs are adopting nation-state-style tactics, two fired contractors were caught deleting U.S. government databases after accidentally recording themselves on Microsoft Teams, and Fortinet has patched critical remote code execution flaws.
    In this episode of Cybersecurity Today, David Shipley breaks down four major cybersecurity stories that security teams need to know.
    Cybersecurity Today would like to thank Material Security for supporting this podcast.  Material security provides. faster, more complete detection and response for email, identity, and data threats inside Google Workspace and Microsoft 365.  Contact them at  material[dot]security 

    Microsoft has confirmed active exploitation of a new Exchange Server zero-day, CVE-2026-42897, affecting Exchange Server 2016, Exchange Server 2019, and Exchange Subscription Edition. There is currently no patch, only mitigations through the Exchange Emergency Mitigation Service, with some trade-offs for Outlook Web App users.
    Security researcher Marcus Hutchins highlights an unusually disciplined ransomware affiliate operation using tradecraft more commonly associated with nation-state attackers, including a custom SentinelOne endpoint detection and response (EDR) killer and a stripped-down toolset designed to leave fewer forensic traces.
    In one of the more astonishing insider threat stories of the week, former OPEX Corporation contractors Muneeb and Sohaib Akhtar were allegedly caught deleting 96 U.S. government databases after leaving a Microsoft Teams recording running.
    Also in this episode: Fortinet has released urgent patches for critical unauthenticated remote code execution vulnerabilities in FortiAuthenticator (CVE-2026-44277) and FortiSandbox (CVE-2026-26083).
    If you're responsible for enterprise security, patch management, incident response, or cyber risk, this is one you need to see.
    Chapters:
    00:00 Sponsor Message
    00:24 Headlines Intro
    00:49 Ransomware Nation-State Discipline
    04:18 Exchange Zero-Day Mitigation
    07:01 Fired Contractors Caught Recording
    09:21 Fortinet Critical Vulnerabilities
    11:07 Wrap Up and Sign Off
    11:38 Sponsor Deep Dive Ad
    #Cybersecurity #MicrosoftExchange #ZeroDay #Ransomware #Fortinet #CyberAttack #Infosec #DavidShipley #CybersecurityToday
  • Cybersecurity Today

    Inside CIRA: How Canada's .ca Registry Became a Global DNS & Cybersecurity Force

    16/05/2026 | 53 min
    David Shipley interviews Jon Ferguson, VP at CIRA, about how the Canadian Internet Registration Authority evolved from early paper-based .ca registrations at UBC into a 142-person, member-based not-for-profit running .ca and authoritative Anycast DNS infrastructure now supporting 550+ TLDs globally. Ferguson explains how .ca's Canadian presence requirements help keep abuse rates low, and how CIRA reinvests surpluses into grants and cybersecurity tools, including Canadian Shield (DNS-based malware/phishing blocking and encrypted DNS with limited data retention) used by about 500,000 people and generating about 20 million blocks per month. They discuss CIRA's focus on municipalities, schools, hospitals, and universities, its move into endpoint security and a managed detection and response partner program with Calian, and concerns about AI-driven threats, online harm, and rebuilding trust and real-world connection.
    00:00 Weekend Show Kickoff
    01:30 Jon's Cyber Journey
    03:06 Inside CIRA DNS Role
    04:59 What Is CIRA
    07:23 Origin Story Of Dot Ca
    13:01 Anycast DNS Explained
    16:27 Canadian Shield DNS Firewall
    22:21 Serving Public Sector Needs
    26:18 Endpoint And MDR Expansion
    35:05 Mission Over Money
    40:39 What Keeps Him Up
    46:19 Hope And Balance Online
    50:55 Wrap Up And Thanks
  • Cybersecurity Today

    How a Google API Key Became an $8,000 AI Bill, Meta Scam Ads Lawsuit, and 73-Second Cyber Attacks

    15/05/2026 | 10 min
    Google Cloud customers are reporting shocking surprise bills after compromised or misused API keys were allegedly used to access expensive Gemini AI services. In one case, Rod Dinan says his monthly Google Cloud costs jumped from under $50 to nearly $8,000. Sydney developer Isuru Fonseka says he was hit despite setting spending controls, raising broader questions about API key security, client-side exposure, billing alerts, and how quickly attackers can exploit AI infrastructure.
    Cybersecurity Today also covers prosecutors' allegations that two fired brothers sabotaged systems tied to government-related work after access wasn't revoked quickly enough, Santa Clara County's civil lawsuit accusing Meta of profiting from scam ads on Facebook and Instagram, and Horizon3.ai's warning that attackers can exploit newly exposed systems in as little as 73 seconds while many organisations still take 24 hours or longer to respond.
    If your organisation uses APIs, AI services, cloud billing controls, or internet-facing infrastructure, this episode matters.
    #Cybersecurity #GoogleCloud #GeminiAI #APIKeys #CloudSecurity #Meta #ScamAds #CyberAttack #CybersecurityToday #AIsecurity
    CHAPTERS
    00:00 Google Cloud API Key Bill Shock
    01:20 Real-World Victims: Surprise AI Charges
    02:24 Why Spending Caps Didn't Stop the Damage
    03:38 The Enterprise Cloud Security Risk
    04:19 Fired Employees and Alleged Insider Sabotage
    04:55 The Database Destruction Timeline
    06:34 What This Incident Teaches Security Teams
    07:10 Santa Clara County Sues Meta Over Scam Ads
    08:46 Attackers Can Strike in 73 Seconds
    10:14 Closing and Next Episode
  • Cybersecurity Today

    Canvas Breach 'Deal' With ShinyHunters, AI Zero-Day Warning, Checkmarx Hit Again

    13/05/2026 | 16 min
    Cybersecurity Today examines a troubling set of new security developments affecting schools, software supply chains, and account security.
    Instructure says it reached an "agreement" with the ShinyHunters threat group after the massive Canvas breach that may have affected up to 275 million users across 9,000 educational institutions. Reports indicate attackers exploited multiple cross-site scripting (XSS) vulnerabilities to hijack administrator sessions and post extortion demands.
    Checkmarx has been breached again. This time, attackers reportedly inserted a malicious Jenkins Application Security Testing (AST) plugin designed to steal credentials. The same threat actor, believed to be Team46/TeamTNT-linked infrastructure or Team PCP depending on reporting attribution, appears to have reused secrets allegedly stolen in the earlier Trivy supply-chain compromise.
    Microsoft and Google are warning organizations not to treat passkeys as a complete security solution. If weaker recovery methods or legacy credentials remain active, attackers can still bypass them.
    Google's Threat Intelligence Group also reports what it describes as the first observed evidence of hostile actors using AI to assist in zero-day vulnerability research and exploit development, signalling a new phase in attacker industrialization.
    Also in today's show: Santa Clara County sues Meta over alleged scam-ad profits.
    Chapters
    00:00 Headlines Overview
    00:28 Canvas Breach Deal Fallout
    01:59 How the XSS Attack Worked
    03:15 Checkmarx Supply Chain Attack
    05:01 Credential Rotation Lessons
    05:37 Why Passkeys Aren't Enough
    07:19 Layered Defence Takeaways
    08:35 AI-Assisted Zero-Day Development
    10:10 Industrialized AI Threats
    13:08 Meta Scam Ads Lawsuit
    15:19 Wrap Up
Más podcasts de Economía y empresa
Acerca de Cybersecurity Today
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Sitio web del podcast

Escucha Cybersecurity Today, Libros para Emprendedores y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Cybersecurity Today: Podcasts del grupo