
Cybersecurity Today
Technology Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Location:
United States
Genres:
Technology Podcasts
Description:
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Language:
English
Website:
https://www.itworldcanada.com
Episodes
Jeff Williams CTO Cofounder of Contrast Security and OWASP co-founder on Mythos and AI Security
4/11/2026
AI-Powered AppSec, OWASP Origins, and Anthropic's "Mythos" Model: Jeff Williams on What Changes Next
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
Jim hosts Jeff Williams (Contrast Security co-founder/CTO and former OWASP global chair) for a wide-ranging discussion that begins with Anthropic's new "Mythos" model, described as powerful for finding zero-day vulnerabilities, and expands into how AppSec must evolve. Williams explains Contrast's runtime instrumentation approach, recounts OWASP's early days, the creation of WebGoat and the OWASP Top 10, and notes that many common vulnerabilities persist despite years of maturity models. They debate open source versus commercial security scrutiny, the likely high cost and scalability limits of advanced AI vulnerability discovery, and why finding more bugs matters only if remediation improves too. Williams argues for AI-powered "software factories" with feedback loops, assurance evidence, and runtime monitoring, and flags the EU Product Liability Directive treating software as a product with no-fault liability for security defects, including those from embedded open source.
00:00 AppSec Stuck in Ruts
00:42 Show Intro and Sponsor
01:40 What Contrast Security Does
02:35 OWASP Origins and WebGoat
04:33 Why the Top 10 Persists
06:28 Mythos Model Overview
08:05 Open Source Scrutiny Myth
11:31 Cost and Adoption Barriers
15:04 Finding vs Fixing Bugs
15:55 AI Code Quality Reality
17:46 AI Powered Software Factory
23:11 Building with AI in Practice
25:18 AppSec Metrics and New Approaches
26:42 Staying Optimistic as a CISO
28:00 EU Product Liability Shift
32:13 Bug Bounties in an AI World
34:06 Wrap Up and Outro
Duration:00:35:43
Fortinet EMS Zero-Day, Anthropic's AI Finds Thousands of Bugs, Iranian Hackers Target US ICS
4/9/2026
Fortinet EMS Zero-Day Exploited, Anthropic's AI Finds Thousands of Bugs, and Iranian Hackers Target US ICS
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
Host David Shipley reports Fortinet issued emergency hotfixes for a new actively exploited FortiClient EMS unauthenticated RCE zero-day (CVE-2026-35616) affecting 7.4.0.5/7.4.0.6, with over 2,000 exposed instances online and a full fix coming in 7.4.0.7. Anthropic says its Claude "Mythos" model (Project Glasswing) has found thousands of high-severity zero days and demonstrated advanced exploit chaining and sandbox escape, but will not be released publicly; it is being used with major partners and funded with up to $100M in credits plus $4M for open-source security. A postmortem details a North Korea–linked social-engineering supply-chain breach of Axios on NPM, part of a broader campaign spreading 1,700+ malicious packages across multiple ecosystems. US agencies warn Iranian-linked hackers are targeting Rockwell/Allen-Bradley PLCs in critical infrastructure. The White House proposes a $707M cut to CISA, reducing staffing while preserving $1.4B for core cybersecurity.
00:00 Headlines and Sponsor
00:55 Fortinet EMS Zero Day
03:21 AI Finds Zero Days
05:56 Axios Supply Chain Breach
08:02 North Korea Package Campaign
10:13 Iran Targets Industrial Control
12:22 CISA Budget Cuts Debate
14:05 Wrap Up and Thanks
14:59 Sponsor Message Meter
Duration:00:15:59
North Korea's $285M Crypto Heist, China Breaches FBI System, Delve Faces New Allegations
4/7/2026
Host David Shiple covers major cybersecurity news: investigators attribute a record $285 million April 1 hack of crypto platform Drift Protocol to North Korea, describing a three-week setup involving a fake "Carbon Vote Token," wash trading to inflate value, social engineering to pre-approve backdoored transactions, Drift's removal of a timelock, and rapid collateralized withdrawals that crashed Drift's token and are now tracked by TRM Labs; the report notes North Korea's 2025 crypto theft total of $2.5B and lifetime total surpassing $7B after this incident, alongside mention of a North Korea-linked supply-chain compromise of the widely used Axios package. Stryker Medical says it has fully recovered from a March 11 Iran-linked wiper attack that used a compromised admin account and Microsoft Intune, prompting Microsoft guidance on multi-admin approval for wipes. The FBI labels a suspected China-linked breach of a U.S. surveillance system a "major incident," likening it to the 2024 Salt Typhoon campaign, while Sen. Mark Warner cites staffing cuts and leadership turmoil at CISA. TechCrunch reports embattled compliance startup Delve faces new claims it repackaged an open-source tool (Sim Studio) as its own "Pathways," as Delve denies broader fraud allegations, says it was targeted by a malicious actor, and Y Combinator cuts ties.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Headlines And Sponsor
00:54 North Korea Crypto Heist
01:16 How The Drift Hack Worked
03:20 Bigger DPRK Crypto Trend
04:24 Stryker Wiper Recovery
06:39 China Breach Major Incident
08:38 Policy And Staffing Fallout
09:37 Delve Startup In Crisis
10:29 Stolen Software Allegations
13:12 Delve Fights Back YC Cuts Ties
14:35 Wrap Up And Thanks
15:12 Sponsor Message Meter
00:00 Headlines And Sponsor
00:54 North Korea Crypto Heist
01:16 How The Drift Hack Worked
03:20 Bigger DPRK Crypto Trend
04:24 Stryker Wiper Recovery
06:39 China Breach Major Incident
08:38 Policy And Staffing Fallout
09:37 Delve Startup In Crisis
10:29 Stolen Software Allegations
13:12 Delve Fights Back YC Cuts Ties
14:35 Wrap Up And Thanks
15:12 Sponsor Message Meter
Duration:00:16:12
Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley
4/3/2026
EV Charging Infrastructure Security: How Hackers Could Disrupt Chargers, Networks, and the Grid
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
In this holiday weekend edition of Cybersecurity Today, Jim Love introduces David Shipley's interview with Steve Visconti, CEO of Xiid Corporation, about cybersecurity risks in electric vehicle (EV) charging infrastructure. Visconti explains Xiid's software-based security layer for IP networks, aimed at critical infrastructure across enterprise, public sector, and DOD environments, and its growing focus on OT/IoT such as EV charging systems. The discussion highlights how EV chargers connect vehicles, homes, back-office billing/control systems, cloud services, and potentially vehicle-to-grid power flows, creating large-scale attack surfaces that could enable disruption, DDoS activity, or broader grid instability. Visconti argues for "unreachability" architectures that close ports and remove static exposure while allowing only registered users and machine-to-machine access. The interview also touches on concerns about vulnerabilities leading to fires, supply-chain risks, and policy debates such as government-accessible vehicle kill switches.
00:00 Holiday Weekend Intro
01:46 Meet Steve Visconti
04:16 EV Charging Symposium
06:40 Vehicle to Grid Risks
09:16 Fires and Attack Vectors
12:14 Making Chargers Unreachable
14:37 Car as the Threat
19:05 Awareness and DDoS Reality
23:09 Government Kill Switch Debate
24:49 Wrap Up and Sponsor Thanks
Duration:00:26:38
Cisco Breached: Source Code Stolen - Cybersecurity Today
4/1/2026
Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws
David Shipley reports multiple major security incidents: attackers used credentials stolen in the Trivy supply-chain attack via a malicious GitHub action to breach Cisco's internal development environment, clone 300+ GitHub repos, steal source code (including AI products) and AWS keys, and impact customer-related code; Cisco contained the breach, re-imaged systems, and rotated credentials. A separate supply-chain attack hit the widely used JavaScript library Axios after its maintainer account was compromised, pushing poisoned NPM versions that installed a dropper/RAT via a fake dependency; users are told to downgrade affected versions, remove the dependency, rotate credentials, and review CI/CD logs. Active exploitation is confirmed for a Fortinet FortiClient EMS SQL injection (CVE-2026-21643) and for critical Citrix NetScaler flaws (CVE-2026-3055, possibly alongside CVE-2026-4368). Anthropic accidentally exposed details of a new model, "Code Mythos," described as highly capable in reasoning, coding, and cybersecurity. Finally, TechCrunch reports escalating allegations that compliance startup Delve helped fabricate audit evidence and worked with weak auditors. The episode also marks show episode 1,500.
00:00 Headlines and Sponsor
00:54 Cisco Trivy Breach
02:28 Axios NPM Attack
04:12 Fortinet SQLi Exploited
06:24 Citrix Bleed Returns
08:05 Anthropic Model Leak
10:24 Fake Compliance Scandal
12:30 Episode 1500 Milestone
14:03 Sponsor Closing Message
Duration:00:15:03
Russian State Hackers Go After IoS Devices
3/30/2026
Mac Malware 'Infinity Stealer,' DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
David Shipley reports from Seoul on major threats: Malwarebytes details Infinity Stealer, a new macOS info-stealer delivered via "ClickFix" social engineering and built as a compiled Python payload (Nuitka) that steals browser credentials, Keychain data, crypto wallets, and developer secrets while notifying attackers via Telegram. Proofpoint links Russia-aligned TA446 (Cold River/Star Blizzard) to spear-phishing using the DarkSword iOS exploit kit to deliver GhostBlade, with DarkSword now leaked on GitHub and Apple pushing unusual on-device warnings for vulnerable iOS versions. Rapid7 describes China-linked "Red Menshen" using the kernel-level BPFdoor backdoor to persist in global telecom networks. TeamTNT compromises the Telnyx PyPI package with WAV-steganography payloads that steal secrets and target Kubernetes. Iran-linked activity includes a symbolic FBI director email breach and escalating, deliberate healthcare disruption via attacks on Stryker and a Pay2Key incident.
00:00 Show Intro and Sponsor
00:53 Mac ClickFix Stealer
03:25 Dark Sword iOS Exploits
06:30 China Telecom Backdoor
08:47 TeamTNT PyPI Supply Chain
12:20 Iran Cyber and Healthcare
17:41 Wrap Up and Thanks
18:43 Sponsor Message
Duration:00:19:42
RSAC Recap: Agentic AI and Interview With Commvault CISO Bill O'Connell
3/28/2026
RSAC Recap: Agentic AI Takes Over, Security Funding Shifts, and Why CISOs Must Focus on Resilience
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
Jim Love and co-host David Shipley recap the RSA Conference in San Francisco, noting that "zero trust" marketing has faded and "agentic AI" (especially "agentic SOC") dominated vendor messaging. David highlights a major market shift: AI is pressuring cybersecurity company valuations and could reduce funding, accelerate consolidation, and raise security costs due to heavy compute requirements, even as demand increases. They discuss how AI disproportionately benefits attackers, including new phishing-as-a-service capabilities, while organizations cut security hiring in anticipation of AI gains. David's standout booth, MindGuard, used a 1990s metaphor to argue AI security is as immature as cybersecurity was decades ago. He also interviews Commvault CSO Bill O'Connell on the evolving CISO role, communicating risk, the importance of recovery and "ResOps," and celebrating CISOs, including Time magazine's CISO of the year concept.
00:00 Weekend Show Kickoff
00:46 RSAC Recap Setup
01:06 Zero Trust Is Dead
01:48 Agentic SOC Everywhere
03:41 AI Shifts Security Valuations
06:55 Peak Security And Consolidation
07:55 Costs And Layoffs Warning
09:35 Attackers Gain The Edge
11:48 RSAC Booth Spectacle
13:39 MindGuard Nineties Metaphor
15:40 Commvault CISO Interview Begins
17:22 Backup To Cyber Resilience
18:04 Modern CISO Role Evolution
19:55 Translating Risk For Leaders
21:44 Risk Versus FUD
22:22 AI Hype And CISO Relevance
23:29 Defining AI And Controls
24:33 Agentic AI And Backups
25:49 Resilience Over Prevention
27:52 ResOps And Practicing Recovery
31:06 Advice For New CISOs
33:30 Celebrating The CISO Role
35:43 Is The Job Worth It
37:06 Host Wrap And Audience Feedback
39:18 Korea Trip And Show Signoff
40:13 Sponsor Message And Closing
Duration:00:41:18
Anonymous Tip System Breach May Expose Tipsters
3/27/2026
Anonymous Tip System Breach Exposes Millions of Records, Google Warns Q-Day by 2029, and New AI Documentation Supply-Chain Risks
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
Jim Love reports that a breach at P3 Global Intel, whose tip-submission systems are used by police, government agencies, and schools, allegedly exposed over 8 million submissions including highly sensitive personal data and raised concerns about anonymity due to features that could disclose tipster IP information; the company says it has not confirmed misuse. Google warns "Q Day," when quantum computers could break widely used public-key encryption, may arrive as early as 2029, intensifying urgency around "harvest now, decrypt later" and adoption of post-quantum cryptography standards. The episode also highlights AI-era supply-chain threats where community-generated documentation can be poisoned with indirect prompt injections that influence AI-generated code, and notes upcoming GitHub Copilot policy changes to use prompts and code context from certain users for training unless they opt out, making data governance critical.
00:00 Headlines And Sponsor
00:45 Anonymous Tip Line Breach
03:42 Quantum Q Day Timeline
06:10 Poisoned Documentation Attacks
08:57 Copilot Training Data Changes
10:27 Wrap Up And Meter Thanks
Duration:00:11:28
RSAC Presenter Says "Time to Kill One of Cybersecurity's Most Overworked Terms"
3/25/2026
RSAC: Retiring "APT," FCC's US-Made Router Ban, Zoom Call Scraping, Iran-Targeting Wiper, and Cyber Terrorism Insurance
From RSAC 2026, host David Shipley highlights ESET researcher Robert Lipowsky's argument to retire the overused "advanced persistent threat" label and instead describe actors by motivation and activity, noting blurred lines between nation-state and criminal tooling. He also reports RSAC vendor trends (zero trust fading, "agentic AI" everywhere) and standout booth themes. In Washington, the FCC bans authorization of any new Wi‑Fi router models not made in the United States, citing supply-chain risk and attacks like Volt Flax and Salt Typhoon, impacting an industry largely manufacturing abroad unless exemptions are granted with plans to reshore. The episode details Webinar TV allegedly joining public Zoom links to record calls and publish AI-generated podcast recaps, and a Kubernetes-targeting campaign linked to the Trivy supply-chain attack that deploys an Iran-checking wiper. Finally, Treasury seeks comments on expanding the terrorism risk insurance backstop (TRIP) to cover cyber losses.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Meter Intro
00:18 Headlines Preview
00:58 Retiring The APT Label
02:51 RSAC Floor Trends
05:08 FCC Router Ban
06:43 Zoom Calls Turned Podcasts
09:29 Iran Targeting Wiper
10:57 Cyber Terrorism Insurance Debate
13:15 Wrap Up And Thanks
13:44 Sponsor Meter Outro
Duration:00:14:36
Startup Accused Of Helping Fake Privacy and Security Audits
3/23/2026
Compliance Startup Audit-Faking Claims, Trivy Supply-Chain Backdoor, Russia Targets Signal/WhatsApp, and Iran-Linked Stryker Disruption
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
This episode covers allegations that Y Combinator-backed compliance startup Delve helped customers fake privacy and security audits by generating fabricated evidence that auditors then rubber-stamped, alongside Delve's denial and a report of sensitive Delve data being externally accessible. It also details a TeamTNT/Team PCP-style supply-chain compromise of Aqua Security's Trivy scanner via GitHub build and tag tampering, briefly distributing a backdoored release that stole cloud credentials, SSH keys, tokens, and more, with guidance to treat affected environments as fully compromised and rotate secrets. The FBI and CISA warn of Russian intelligence-linked phishing targeting Signal and WhatsApp accounts through social engineering and malicious QR codes. Finally, it describes the real-world impact of an Iran-linked Handala cyberattack on Stryker, disrupting custom implant logistics and delaying surgeries.
00:00 Sponsor Message Meter
00:18 Headlines Overview
00:48 Delve Audit Allegations
03:27 Trivy Scanner Backdoor
06:01 Russian Phishing Signals
08:54 Stryker Attack Fallout
11:30 Wrap Up And RSAC
11:48 Sponsor Message Meter
Duration:00:12:41
The Fundamental Mistake in Cybersecurity Risk Management
3/21/2026
Cybersecurity Isn't Managing Risk—It's Managing Threats... And That's the Problem
Host David Shipley speaks with Jeff Gardner, a former university CISO and now at Morgan Stanley, about Gardner's doctoral research arguing that cybersecurity has structurally misclassified "risk management" as threat management.
Gardner explains that real risk is an expected loss calculation (impact × likelihood), while many cybersecurity frameworks and training emphasize vulnerabilities, exploitability, and system configuration without likelihood or business impact. He describes examples where teams labeled unlikely issues as "extremely high risk," discusses interviews where leaders universally expect cybersecurity staff to be risk managers, and cites findings that only about 11% of cybersecurity professionals actually perform risk calculations. Gardner outlines a practical approach using qualitative likelihood and impact scales, prioritization, and clearer business framing, and notes ongoing discussions with NIST to improve the NICE framework.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Message
00:19 Meet Jeff Gardner
01:51 Career Journey Origins
03:23 TLS Risk Epiphany
05:06 What Is Compute Canada
06:38 Risk Versus Threat
08:35 Why Labels Matter
11:13 Likelihood And Impact
12:26 Teaching Risk Qualitatively
15:29 Why Prioritize Risk
20:36 Training Frameworks Flaw
25:13 Research Frustrations
25:51 Risk Management Wins
26:44 Why CISOs Burn Out
27:43 Speaking Executive Risk
29:22 Teach Risk Broadly
31:36 Biases and Better Judgments
35:17 Sexy Scary vs Real Risk
36:12 Convincing the Room
39:15 Start Simple Frameworks
41:36 Risk Quadrants and Delegation
45:30 Mentorship and NIST V3
47:57 Wrap Up and Sponsor
Duration:00:49:39
FBI Seizes Iran-Linked Handala Leak Site After Stryker Intune Wipe Attack: Cybersecurity Today
3/20/2026
FBI Seizes Iran-Linked Handala Leak Site After Stryker Intune Wipe Attack; Apple iPhone Exploit Patch; North Korean Fake IT Workers Grow
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
The episode reports that the FBI has seized the data leak site used by the Iran-linked hacktivist group Handala, which has been widely linked to the Stryker attack where attackers compromised admin accounts, stole data, and used Microsoft Intune to remotely wipe and factory reset roughly 80,000 managed devices. CISA and Microsoft warn organizations to harden Intune and identity controls with least privilege, role-based access, MFA, conditional access, and requiring multi-admin approval for sensitive actions like device wipes. Apple urges iPhone users to update after fixing actively exploited flaws used in targeted, sophisticated campaigns, noting risks even for those who think Apple devices aren't targeted. The show also highlights new FLAIR research showing North Korean operatives continue infiltrating Western firms as remote IT workers using stolen or fabricated identities, exploiting weak hiring verification and broad access.
LINKS
https://flare.io/learn/resources/north-korean-infiltrator-threat
00:00 Sponsor Message Meter
00:19 Headlines And Intro
00:46 FBI Seizes Handala Leak Site
02:31 CISA And Microsoft Intune Guidance
04:37 Apple iPhone Update Warning
06:10 North Korean Fake IT Workers
07:56 Links Sharing And Wrap Up
08:29 Sponsor Thanks And Sign Off
Duration:00:09:26
Another Medicat Device Firm Hit
3/18/2026
Medical Device Breaches, Anti-Scam Pledge Scrutiny, AI Font Trick, and Iran-Linked Cyber Updates.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
The episode covers several cybersecurity stories: Intuitive Surgical disclosed a March 12 phishing-led intrusion where stolen credentials enabled access to its internal administrative network and data theft (customer/business contacts and employee records), while clinical platforms and Da Vinci/Ion systems remained unaffected. Eleven tech and retail firms including Google, Amazon, and OpenAI pledged to share threat intel on scams, amid skepticism and Verafin figures estimating $4.4T in global financial crime in 2025 and rising AI-driven fraud. LayerX demonstrated a font/CSS "glyph substitution" technique that shows humans a malicious command while AI assistants read benign text; Microsoft addressed it, while others deemed it out of scope. In Iran-war updates, senior Iranian cyber figures were reportedly killed; Iran-linked group Handala's Stryker attack allegedly wiped nearly 80,000 devices via compromised admin accounts and Intune, with further unverified leak claims. Denver crosswalk speakers were hacked due to default passwords.
00:00 Sponsor Message Meter
00:19 Medical Device Breach
01:52 Phishing Still Wins
02:32 Tech Pledge Against Scams
03:43 Fraud Numbers And AI
05:49 Font Trick AI Bypass
07:22 Vendor Responses Lessons
09:03 Iran Cyber War Updates
10:00 Stryker Intune Wipe Attack
11:07 More Iranian Claims
12:17 Denver Crosswalk Hack
13:10 Wrap Up And Signoff
13:33 Sponsor Outro Meter
Duration:00:14:24
Notorious Hacker Group "The Comm," Operation Synergia Takedown, Stryker Cyberattack Update & More
3/16/2026
Alleged Canadian 'The Comm' Hacker Arrested, Interpol's Operation Synergia Takedown, Stryker Cyberattack Update and more..
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
Host David Shipley covers new details on the alleged takedown of "Waifu," a Canadian hacker tied to the cybercrime group The Com, after a harassment campaign against investigator Allison Nixon helped lead to his identification and arrest; he now faces U.S. charges including extortion and unauthorized computer access. The episode also highlights Interpol's six-month Operation Synergia, a major international crackdown that disabled 45,000 malicious IPs and led to 94 arrests across 72 countries, targeting ransomware, phishing, and malware infrastructure. An update on Stryker describes an attack on its Microsoft corporate systems allegedly involving Intune to wipe over 200,000 devices, with Stryker saying connected medical devices and services remain safe while ordering and operations are disrupted. Finally, Poland reports it stopped an attempted hack on its National Center for Nuclear Research that may have Iranian links, though officials caution indicators could be misdirection.
00:00 Sponsor Meter Intro
00:19 Headlines And Welcome
00:50 Calm Hacker Takedown
02:49 Threats Against Researcher
04:21 Unmasking And Arrest
05:46 Interpol Operation Synergy
08:10 Stryker Intune Attack Fallout
12:56 Iran Cyber War Updates
13:43 Poland Nuclear Hack Attempt
16:14 Wrap Up And Thanks
16:52 Sponsor Meter Outro
Duration:00:17:44
AI Anxiety: Cybersecurity Today with Special Guest Krish Banerjee, Managing Director (Partner) & Canada Lead - Data & AI - Accenture
3/14/2026
Gemini in Google Workspace, Agentic AI, and Managing AI Anxiety (with Accenture's Krish Banerjee)
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
In a special edition of Project Synapse shared with Cybersecurity Today, host Jim Love and co-host John Pinard (a VP and CSO at a Canadian financial institution) speak with Krish Banerjee, Accenture's managing director and partner leading AI in Canada. They discuss Google integrating Gemini into Workspace and how AI assistants like Gemini and Microsoft Copilot are converging, along with recent moves around agent platforms and the business models of AI, including Meta and Nvidia's evolving strategies and Nvidia's push toward enterprise agent infrastructure amid rapidly rising compute demand. The conversation explores why AI adoption lags capability, emphasizing task-based redesign, human-in-the-loop guardrails, and not "AI-washing" broken processes. They also address AI anxiety, training and culture change, impacts on education and jobs, and practical ways to use agents to stay informed and productive.
00:00 Sponsor Message
00:20 Show Intro and Guests
01:12 Gemini Comes to Workspace
03:38 AI Tool Leapfrogging
05:06 Agent Network Acquisitions
07:53 Nvidia Bets on Enterprise Agents
11:08 Why AI Adoption Lags
14:27 Agentic AI and Process Redesign
16:19 Security Guardrails and Human Oversight
24:05 Accenture Transformation and Training
26:55 AI Anxiety in the Workplace
30:22 Tasks Not Jobs
32:12 Outcome First Thinking
34:15 Personal AI Assistants
37:24 Building Agents Together
38:35 Executive Learning Curve
44:31 Kids And AI Natives
50:15 Critical Thinking And Trust
54:15 Company Advice Focus Value
55:58 Wrap Up And Sponsor
Duration:00:58:17
AI Agent Hacks McKinsey Chatbot in 2 Hours
3/13/2026
AI Agent Hacks McKinsey Chatbot in 2 Hours, NPM Phantom Raven, Router Malware & Trojaned AI Models
This episode covers how researchers at CodeWall used an autonomous AI security agent to gain read/write access to McKinsey's internal chatbot Lilli database in about two hours by chaining exposed APIs and an SQL injection, potentially exposing 46.5 million chats, 728,000 files, 57,000 accounts, and 95 system prompts, with McKinsey saying the issues were fixed and no unauthorized access was found. It also reports on the Phantom Raven supply-chain campaign that published 88 malicious NPM packages using a runtime-downloaded payload to steal developer system data like SSH keys and host details. A study warns that 83% of 800 million compromised passwords still meet complexity rules, highlighting credential-stuffing risk and the need for breach checks and MFA. The show notes 14,000+ routers infected with persistent malware often requiring factory resets plus hardening, and discusses Trojan backdoors embedded in AI models that trigger misbehavior under specific inputs, calling for new AI security testing and validation.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Meter Intro
00:20 Headlines And Welcome
00:55 AI Agent Hacks McKinsey Bot
03:44 Phantom Raven NPM Malware
05:55 Strong Passwords Still Leaked
07:55 Router Malware That Persists
09:36 Trojan Backdoors In AI Models
12:01 Call For AI Backdoor Research
12:30 Sponsor Meter Outro
13:13 Sign Off
Duration:00:13:24
Cyber Security Today Special Report: Attack from Iran
3/11/2026
This inlcudes our reguar Wednesday/Thursday segment but with an update from this breaking story on the attack on a large US medical company.
Duration:00:21:31
Fake Claude Code Installs, Arpa Phishing, Iranian and Russian Teams Mount Cyber Retaliation
3/11/2026
Fake Claude Code Installs, Arpa Phishing, Zombie ZIP Malware Evasion, and Iran/Israel Cyber Retaliation
This episode covers four major security stories: the "InstaFix" campaign using Google sponsored ads and cloned Claude Code install pages to trick developers into pasting terminal commands that deploy the TeraStealer credential-stealing malware; a phishing technique abusing the special-use .arpa domain and IPv6 reverse DNS to evade email and domain-based defenses, using attacker-controlled DNS zones, traffic distribution systems, and lures like surveys and account notices; the "Zombie ZIP" technique that manipulates ZIP headers to bypass AV/EDR scanning, tied to CVE-2026-0866 and demonstrated to evade most VirusTotal engines; and a surge in pro-Iranian and pro-Russian hacktivist retaliation targeting Israel and regional entities with DDoS, defacements, breach claims, and disinformation, alongside Israel's humorous counter-psychological video response.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Message Meter
00:19 Headlines And Intro
00:51 Fake Claude Install Scam
04:25 Arpa Domain Phishing
08:30 Zombie Zip Malware Trick
10:57 Cyber Retaliation Surge
13:44 Israel's PSYOP Video
14:25 Wrap Up And Sponsor
Duration:00:15:48
Coruna iOS Exploit Kit Goes Mass-Market: Cybersecurity Today for March 9, 2026 with David Shipley
3/9/2026
Coruna iOS Exploit Kit Goes Mass-Market, FBI Wiretap Platform Breach Probe, Windows Terminal ClickFix, and Iran-War Cyber Escalation
This episode covers several major cybersecurity developments: Google's Threat Intelligence Group details Coruna, a sophisticated iOS exploit kit with 23 exploits and multiple chains affecting iOS 13–17.2.1, shifting from targeted surveillance use to cryptocurrency-scam distribution and a PlasmaLoader payload aimed at stealing wallet data. The FBI is investigating suspicious activity involving its Digital Collection System Network used to support wiretaps and surveillance, with concerns about third-party vendor exposure and broader federal agency targeting. Microsoft reports a new ClickFix variation that abuses Windows Terminal to deploy the Luma Stealer via encoded commands, persistence, Defender exclusions, and browser injection. The show also reviews Iran-linked cyber activity by MuddyWater and others amid regional conflict, including new backdoors and cloud-based exfiltration, and reports that Iranian drone strikes hit AWS data centers in the UAE and Bahrain, causing outages and highlighting data centers as battlefield targets.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Message Meter
00:19 Headlines And Intro
00:50 Coruna iOS Exploit Kit
04:06 FBI Wiretap Platform Breach
06:52 ClickFix Hits Windows Terminal
10:00 Iran War Cyber Campaigns
14:59 Drones Hit AWS Data Centers
17:57 Wrap Up And Thanks
18:35 Sponsor Close Meter
Duration:00:19:34
Cybersecurity Today Month in Review: World In Turmoil
3/7/2026
Cybersecurity Today Month in Review: Iran Conflict Cyber Spillover, IoT Cameras, AI Hacking Tools, and Resilience Planning
In this weekend month-in-review episode, host Jim Love and panelists David Shipley, Laura Payne, Neil Bisson, and Chris "CJ" Johnson discuss cyber and infrastructure impacts tied to the US/Israel–Iran conflict, including reported compromise of traffic camera networks for targeting, Iran's defensive internet shutdown, propaganda via a hacked prayer app, and GPS/AIS spoofing that misdirected ships in the Strait of Hormuz, raising oil and helium supply-chain concerns. They warn of potential Iranian retaliation via DDoS, ransomware, and critical infrastructure attacks (especially water/OT), amplified by insecure IoT and camera vulnerabilities (e.g., Hikvision). The group critiques weakened government cyber capabilities (including CISA turmoil and CVE program risk), highlights AI-enabled attack automation (CyberStrike AI) shrinking time-to-exploit, and stresses practical resilience planning, including protecting AI API keys after an $82,000 billing incident and noting a law-enforcement takedown of LeakBase.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Message Meter
00:18 Meet the Panel
01:41 MSPs and Security Assumptions
03:36 War and Cyber Spillover
06:52 Iran Internet Shutdown Explained
08:27 GPS Spoofing in Strait
10:32 Retaliation Risks to West
17:02 IoT Cameras as Targets
18:56 What IT Providers Should Do
22:03 Who Should Worry Most
26:18 Regulation and IoT Standards
28:58 Supply Chain and State Actors
31:36 CISA and CVE Turmoil
35:53 Ring Backlash and Big Tech
37:43 OpenAI Alerts and Privacy
39:25 AI Cultural Blind Spots
40:05 Therapy Duty to Report
41:17 Licensing AI Advice
42:16 Data Centers Under Fire
43:59 Continuity Without Claude
45:05 Power Grid Reality Check
46:47 MSPs and AI Dependence
49:58 Hype Versus Security Markets
51:02 CyberStrike AI Tooling
56:37 Nation State Plausible Deniability
59:58 Exploit Speed and Software Debt
01:03:37 Practical Tips and Wrap Up
Duration:01:12:26