loader from loading.io

Cybersecurity Today: Balancing Trust, Risks, and Innovations

Cybersecurity Today

Release Date: 06/25/2025

Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats show art Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats

Cybersecurity Today

In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powered Code Editor 'Cursor', which could allow prompt injection attacks. Further topics include a new ransomware attack exploiting Microsoft SharePoint vulnerabilities investigated by Palo Alto Networks, and a campaign leveraging fake OAuth apps to...

info_outline
Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts show art Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts

Cybersecurity Today

This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges law enforcement faces in combating such crimes. They discuss the effectiveness of public-private partnerships, the importance of victim-centric approaches, and emerging fraud trends such as investment scams and bank imposter scams. The episode...

info_outline
Cybersecurity Today: Supply Chain Attacks, St. Paul's Cyber Emergency, and Ingram Micro's Data Breach show art Cybersecurity Today: Supply Chain Attacks, St. Paul's Cyber Emergency, and Ingram Micro's Data Breach

Cybersecurity Today

In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support, and the City’s struggle to comprehend the full scope of the hack. Additionally, the US Cybersecurity and Infrastructure Security Agency (CISA) has released a new eviction strategies tool to help cybersecurity teams remove persistent threats. The...

info_outline
Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas show art Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas

Cybersecurity Today

In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of malware, including Info Stealers and a Backdoor. Additionally, researchers discover that OpenAI's GPT-4 agent can bypass CAPTCHAs, raising concerns about the future of this security measure. 00:00 Introduction and Headlines 00:28 Tea App's Major Data...

info_outline
Amazon AI Tool Hacked, Scattered Spider Attacks VMware, and Major Ransomware Takedown | Cybersecurity Today show art Amazon AI Tool Hacked, Scattered Spider Attacks VMware, and Major Ransomware Takedown | Cybersecurity Today

Cybersecurity Today

In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon's generative AI coding assistant 'Q' was compromised by a hacker who injected data-wiping code into the tool's GitHub repository. Scattered Spider, a notorious cybercrime group, continues its malware attacks on VMware ESXI hypervisors using advanced social engineering techniques. In a significant enforcement action, global law enforcement dismantled the Black Suit ransomware infrastructure under Operation Checkmate. Lastly, Insurance Giant Allianz Life revealed...

info_outline
The Evolution and Defense Against Advanced Phishing Attacks show art The Evolution and Defense Against Advanced Phishing Attacks

Cybersecurity Today

This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering.   In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, explore the evolution, intricacies, and impact of phishing attacks. They highlight recent sophisticated phishing strategies that combine AI, complex setups, and psychological manipulation to deceive even the most knowledgeable individuals. The...

info_outline
Sharepoint Hack Reaches Crisis Level and more: Cybersecurity Today for July 25, 2025 show art Sharepoint Hack Reaches Crisis Level and more: Cybersecurity Today for July 25, 2025

Cybersecurity Today

The recent Sharepoint hack is spreading like wildfire through unpatched systems. All this and more on today's episode with guest host David Shipley. 

info_outline
Having some technical problems with podcast distribution. show art Having some technical problems with podcast distribution.

Cybersecurity Today

We're having some issues with podcast distribution. We're going to take a couple of days to figure out what is going on and what, if anything, we can do about it. 

info_outline
NPM Linter Packages Hijacked, Microsoft's China Issue, and AI in Phishing Attacks: Cybersecurity Today: show art NPM Linter Packages Hijacked, Microsoft's China Issue, and AI in Phishing Attacks: Cybersecurity Today:

Cybersecurity Today

In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads.  Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. Microsoft discontinues the use of China-based engineers for US Department of Defense systems following a controversial report. Lastly, social engineering, facilitated by AI, becomes a greater threat than zero-day exploits. The episode...

info_outline
Exploring the Dark Side of AI: Risks, Consciousness, and Responsibility show art Exploring the Dark Side of AI: Risks, Consciousness, and Responsibility

Cybersecurity Today

The Cybersecurity Today episode revisits a discussion on the risks and implications of AI hosted by Jim Love, with guests Marcel Gagné and John Pinard. They discuss the 'dark side of AI,' covering topics like AI misbehavior, the misuse of AI as a tool, and the importance of data protection in production environments. The conversation delves into whether AI can be conscious and the ethical considerations surrounding its deployment, particularly in highly regulated industries like finance. They emphasize the need for responsible use, critical thinking, and ongoing oversight to mitigate...

info_outline
 
More Episodes

In this episode of Cybersecurity Today, host Jim Love discusses various pressing issues and trends in the realm of cybersecurity. The episode starts with a revelation from Okta's 2025 Customer Identity Trends report, which highlights the conflicting digital behaviors of Canadians who, despite their fear of identity theft, often reuse passwords across multiple accounts. The show also dives into the sophisticated 'Lap Dogs' campaign led by Chinese hackers who have compromised home and small office devices worldwide. Jim further touches upon the surprising decline in cyber insurance premiums despite persisting threats, alongside a story about Jeff Bezos potentially spying through smart mattresses with security vulnerabilities. The episode underscores the critical need for better security measures and the potential business risks of weak authentication systems.

00:00 Introduction and Host Welcome
00:24 Canadian Identity Theft Concerns
03:02 Chinese Hacking Operation Exposed
06:02 Cyber Insurance Premiums Drop
09:39 Smart Mattress Security Nightmare
12:46 Conclusion and Contact Information