エピソード

  • A Nightmare of Vibeware - 2026-03-09
    2026/03/10
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — That's Not How It Works(04:03) - A Nightmare of Vibeware – 2026-03-09(05:17) - Story # 1: APT36: A Nightmare of Vibeware(14:19) - Story # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres(16:51) - Story # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report(24:51) - Story # 4: Introducing the First Frontier Suite built on Intelligence + Trust(29:22) - Story # 5: Motorola partners with GrapheneOS for future phones(29:36) - Story # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OS(30:16) - Story # 6: Western allies form 6G security coalition amid tech rivalry with China(34:24) - Story # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacks(36:10) - Story # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026(44:56) - Story # 9: LexisNexis confirms data breach as hackers leak stolen files(49:33) - Story # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutional(56:22) - ANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuiggan(57:10) - SOC Summit 2026LinksStory # 1: APT36: A Nightmare of VibewareStory # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centresStory # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: ReportStory # 4: Introducing the First Frontier Suite built on Intelligence + TrustStory # 5: Motorola partners with GrapheneOS for future phonesStory # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OSStory # 6: Western allies form 6G security coalition amid tech rivalry with ChinaStory # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacksStory # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026Story # 9: LexisNexis confirms data breach as hackers leak stolen filesStory # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutionalANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuigganTroy & Wade’s Upcoming Things:– Antisyphon Training SOC Summit 2026– Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda– Network Forensics and Incident Response with Troy Wojewoda🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
    続きを読む 一部表示
    1 時間 1 分
  • Pentagon Declares Anthropic a Supply Chain Risk — 2026-03-02
    2026/03/06
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Kerberoasting Too Hard(05:28) - Pentagon Declares Anthropic a Supply Chain Risk — Talkin’ Bout [infosec] News 2026-03-02(09:03) - Story # 1: Pentagon Designates Anthropic Supply Chain Risk(17:50) - Story # 2: European Parliament blocks AI on lawmakers’ devices, citing security risks(21:46) - Story # 3: Mexican Government Breach and the Rise of Agentic Cyber Threats(23:21) - Story # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface(33:27) - Story # 5: Leak confirms GrapheneOS & Motorola partnership for non-Pixel hardware(38:47) - Story # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio(39:44) - Story # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems(43:35) - Story # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaks(46:03) - Story # 8: Discord puts global age verification policy on hold after backlash(46:53) - Story # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setup(52:14) - Story # 10: User accidentally gains control of over 6,700 robot vacuums(53:58) - Story # 11: App Warns You if Someone Is Wearing Smart Glasses Nearby(57:55) - Weekly CTF Winners(58:51) - Story # 12: Microsoft is blocking 'Microslop' comments in Copilot's official Discord server(59:24) - Story # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesLinksStory # 1: Pentagon Designates Anthropic Supply Chain RiskStory # 2: European Parliament blocks AI on lawmakers’ devices, citing security risksStory # 3: Mexican Government Breach and the Rise of Agentic Cyber ThreatsStory # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack SurfaceStory # 5: Leak confirms GrapheneOS & Motorola partnership for non-Pixel hardwareStory # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolioStory # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN SystemsStory # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaksStory # 8: Discord puts global age verification policy on hold after backlashStory # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setupStory # 10: User accidentally gains control of over 6,700 robot vacuumsStory # 11: App Warns You if Someone Is Wearing Smart Glasses NearbyStory # 12: Microsoft is blocking ‘Microslop’ comments in Copilot’s official Discord serverStory # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
    続きを読む 一部表示
    1 時間 4 分
  • The Coming SAAS Apocalypse - 2026-02-23
    2026/02/25
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/In this episode:Agentic AI tools that can autonomously perform tasks like researching and booking flights, raising concerns about automated purchases, fraud, guardrails, and over-trust in AI systems.The idea of a coming “SaaS apocalypse,” where AI tools could replicate or replace many small- and mid-tier SaaS products by crawling and recreating their functionality—potentially disrupting payroll, accounting, and other service platforms.Android’s shift away from its open-platform roots, including concerns about reduced openness, developer anonymity in app stores, and the broader implications for privacy-focused users and alternative operating systems.Ongoing tensions in the tech ecosystem around platform control, openness, and general-purpose computing, particularly involving large vendors like Google, Apple, Oracle, and major cloud providers.Broader security implications of AI adoption, including hallucinations, accountability, and how organizations are integrating AI to cut costs versus innovate.The discussion centers strictly on these current tech news developments and their security, privacy, and market impact.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Take the interstate to Dubai(05:16) - The Coming SAAS Apocalypse - 2026-02-23(08:02) - Story # 1: Keep Android Open(15:57) - Story # 2: Meta patents AI that takes over a dead person’s account to keep posting and chatting(21:36) - Story # 3: The Coming SaaS Apocalypse...(29:15) - Story # 4: Firm Data on AI(30:06) - Story # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago(36:38) - Story # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports(41:04) - Story # 6: Conduent data breach could be largest in U.S. history(43:36) - Story # 6: The Erosion of Agency and the New Burden on Leaders(46:25) - Story # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability(48:53) - Story # 8: AI-augmented threat actor accesses FortiGate devices at scale(52:05) - Story # 9: I hacked ChatGPT and Google's AI - and it only took 20 minutes(01:03:30) - Antisyphon Training SOC Summit, March 25, 2026(01:04:03) - Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM Systems(01:04:21) - Antisyphon Workshop: Hacking AI-LLM Applications(01:04:50) - Antisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK(01:05:16) - PODCAST : A.I. Security OpsLinksStory # 1: Keep Android OpenStory # 2: Meta patents AI that takes over a dead person’s account to keep posting and chattingStory # 3: The Coming SaaS Apocalypse…Story # 4: Firm Data on AIStory # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years agoStory # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reportsStory # 6: Conduent data breach could be largest in U.S. historyStory # 6: The Erosion of Agency and the New Burden on LeadersStory # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential VulnerabilityStory # 8: AI-augmented threat actor accesses FortiGate devices at scaleStory # 9: I hacked ChatGPT and Google’s AI - and it only took 20 minutesAntisyphon Training SOC Summit, March 25, 2026Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM SystemsAntisyphon Workshop: Hacking AI-LLM ApplicationsAntisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREKPODCAST : A.I. Security Ops🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to watch this episode on YouTube. Click here to view the episode transcript.
    続きを読む 一部表示
    1 時間 6 分
  • Palo Alto Fears China Retaliation – 2026-02-16
    2026/02/22
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today’s cyber landscape.They also explore the escalating AI arms race, including Meta’s aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatChapters(00:00) - PreShow Banter™ — Threat Actor Age Range(06:00) - Palo Alto Fears China Retaliation – 2026-02-16 (11:51) - Story # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say(16:24) - Story # 2: Rent a Human(21:02) - Story # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman says(24:54) - Story # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead(28:53) - Story # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use(30:55) - Story # 6: Data Exfil from Agents in Messaging Apps(32:38) - Story # 7: AMOS infostealer targets macOS through a popular AI app(39:48) - Story # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach(46:34) - Story # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next month(50:22) - Story # 10: SolarWinds Web Help Desk Exploitation - February 2026(54:23) - Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers(58:36) - Story # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks(01:01:22) - Eric's Workshop(01:01:54) - Jennifer's Workshop(01:04:59) - SOC Summit 2026LinksStory # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources sayStory # 2: Rent a HumanStory # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman saysStory # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges aheadStory # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial UseStory # 6: Data Exfil from Agents in Messaging AppsStory # 7: AMOS infostealer targets macOS through a popular AI appStory # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data BreachStory # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next monthStory # 10: SolarWinds Web Help Desk Exploitation - February 2026Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokersStory # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks01:01:00 - Eric’s Workshop01:01:31 - Jennifer’s Workshop01:04:37 - SOC Summit 2026Creators & Guests Corey Ham - HostWade Wells - HostBronwen Aker - HostRalph May - HostChed "cheddar" Wiggins - GuestJennifer Shannon - GuestEric Kuehn - GuestClick here to watch a video of this episode. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
    続きを読む 一部表示
    1 時間 8 分
  • Live From WWHF Mile High 2026 – 2026-02-11
    2026/02/18

    🧦 SOC Summit 2026
    https://www.antisyphontraining.com/event/soc-summit/


    Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience.

    This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities.

    Join us LIVE on Mondays, 4:30pm EST.
    A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
    https://www.youtube.com/@BlackHillsInformationSecurity

    Chat with us on Discord! -
    https://discord.gg/bhis
    🔴live-chat


    Chapters

    • (00:00) - PreShow Banter™ — Corey Olympics
    • (02:46) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features
    • (08:05) - Story # 2: Discord will require a face scan or ID for full access next month
    • (10:40) - Story # 3: 2026-01-14: The Day the telnet Died
    • (15:27) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution
    • (16:55) - Story # GRITREP: 0APT and the Victims Who Weren’t
    • (21:17) - The advanced advancement of AI models

    Click here to watch a video of this episode.
    Creators & Guests
    • John Strand - Host
    • Corey Ham - Host
    • Derek Banks - Guest
    • Andrew Krug - Guest
    • Chadd Watson - Guest
    • Hayden Covington - Host

    Click here to view the episode transcript.

    Links
    Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features
    Story # 2: Discord will require a face scan or ID for full access next month
    Story # 3: 2026-01-14: The Day the telnet Died
    Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution
    Story # GRITREP: 0APT and the Victims Who Weren’t

    🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits

    https://poweredbybhis.com


    Brought to you by:

    Black Hills Information Security

    https://www.blackhillsinfosec.com


    Antisyphon Training

    https://www.antisyphontraining.com/


    Active Countermeasures

    https://www.activecountermeasures.com


    Wild West Hackin Fest

    https://wildwesthackinfest.com

    続きを読む 一部表示
    34 分
  • US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02
    2026/02/05
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatThis episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.Chapters(00:00) - PreShow Banter™ — Robot Drivers(06:52) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02(10:17) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT(19:26) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies(23:24) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users(26:53) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed(31:18) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site(36:36) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security(39:35) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity(41:36) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google(45:32) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries(49:12) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group(52:28) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine(54:51) - Story # 12: Attack on Renewable Energy Plants(56:49) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud BlogLinksStory # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPTStory # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependenciesStory # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select UsersStory # 4: Millions of Gmail, Facebook and other account credentials exposedStory # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the SiteStory # 6: County pays $600,000 to pentesters it arrested for assessing courthouse securityStory # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodityStory # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of GoogleStory # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 CountriesStory # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware groupStory # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in UkraineStory # 12: Attack on Renewable Energy PlantsStory # 13: Disrupting the World’s Largest Residential Proxy Network | Google Cloud BlogWade & Hayden on Simply Cyber - https://www.youtube.com/live/c_lUP5gR15IHayden’s Class - https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/Mishaal’s Class - https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
    続きを読む 一部表示
    1 時間 5 分
  • TikTok's invasive Privacy Policy - 2026-01-26
    2026/01/28
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatIn this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.Chapters:(00:00) - PreShow Banter™ — Electroshock Therapy(02:51) - 2026-01-26(07:56) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched(14:50) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root(18:00) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy(24:28) - Story # 4: Supreme Court to hear Facebook pixel tracking case(31:25) - Story # 5: Google accused of grooming kids after child receives this email(35:01) - Story # 6: House of Lords backs legislation to ban social media for children under 16(36:10) - Story # 6b: Australia has banned social media for kids under 16. How does it work?(42:43) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)(48:52) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites(52:32) - ClawdBot / MoltbotLinks:Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patchedStory # 2: Hackers exploit critical telnetd auth bypass flaw to get rootStory # 3: Clara Hawking’s Post on TikTok’s Pivacy PolicyStory # 4: Supreme Court to hear Facebook pixel tracking caseStory # 5: Google accused of grooming kids after child receives this emailStory # 6: House of Lords backs legislation to ban social media for children under 16Story # 6b: Australia has banned social media for kids under 16. How does it work?Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)Story # 8: 1Password adds pop-up warnings for suspected phishing sitesClawdBot / MoltbotTroy’s WorkshopANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
    続きを読む 一部表示
    1 時間 4 分
  • Chinese firms drop US and Israeli cybersecurity software - 2026-01-19
    2026/01/20
    🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comThis episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.Chapters(00:00) - PreShow Banter™ — Podcast Banter(04:36) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19(09:19) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say(14:05) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system(16:48) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports(18:43) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.(20:25) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment(28:04) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe(29:35) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes(42:10) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations(49:53) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow(55:52) - CTF Winners(59:42) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claimsLinksStory # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources sayStory # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing systemStory # 3: Hacker gets seven years for breaching Rotterdam and Antwerp portsStory # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experimentStory # 6: Hungary grants asylum to former Polish minister implicated in spyware probeStory # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakesStory # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrationsStory # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNowChickenSec: KFC app ‘more secure’ than Manage My Health, expert claimsBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
    続きを読む 一部表示
    1 時間 4 分