loader from loading.io

Cybersecurity Impact of DOGE, Apple's Stand Against Encryption Backdoors

Shared Security

Release Date: 03/03/2025

Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous show art Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous

Shared Security

In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with these scams and using built-in filters and reporting options on your mobile device. Show notes:

info_outline
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis show art Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

Shared Security

This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss the implications of these events, the underlying issues with patching systems, and the complexities of protecting applications like SharePoint. Stay informed on the latest cybersecurity developments and get insights on what might have gone wrong....

info_outline
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate show art Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate

Shared Security

In this episode, we examine Amazon's Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation's recent report criticizes Ring's AI-first approach and the rollback of prior privacy reforms, describing it as 'techno authoritarianism.' We also discuss a recent scare among Ring users on May 28, related to an unexplained series of logins, said by Amazon to be a UI glitch. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore these issues, share personal anecdotes about their experiences with tech, and discuss broader implications for...

info_outline
Passwords and the Elderly: Why Writing Them Down Might Be OK show art Passwords and the Elderly: Why Writing Them Down Might Be OK

Shared Security

In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous anecdotes and touches on broader cybersecurity issues such as risk assessment and the importance of tailoring security solutions to individual needs. Tune in for insights on making security accessible and effective for an often overlooked group. Show...

info_outline
The Google Workspace Security Gap: Why Traditional Tools Fall Short show art The Google Workspace Security Gap: Why Traditional Tools Fall Short

Shared Security

In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional tools, and how Material Security provides comprehensive solutions. Rajan shares his professional journey, insights into Google's APIs, and how their service stands out. Tune in to understand why legacy tools may leave critical gaps in your...

info_outline
Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever show art Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever

Shared Security

In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne's leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI in pen testing, the implications for pen testers, bug bounty hunters, and security teams, and whether this represents a genuine advancement or just more AI hype. Thanks to Material Security for sponsoring this episode! Protect your Google...

info_outline
Cybersecurity Talent Shortage: Myth, Mismatch, or Reality? show art Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?

Shared Security

Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, Senior Consultant at Avetix Cyber and co-founder of the CyberVault Podcast, to discuss the challenges and misconceptions in the industry. They explore whether the shortage is a myth, a mismatch, or something else entirely and what companies and professionals can do about it. With insights into hiring practices, skill shortages, and the importance of...

info_outline
Kids Online Safety Act (KOSA): Protecting Kids or Censorship? show art Kids Online Safety Act (KOSA): Protecting Kids or Censorship?

Shared Security

In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. We also touch on the broad support for the bill from both political parties and the involvement of social media giants like X. Additionally, we examine the balance between government regulation and parental responsibility in ensuring online safety for children. Thanks to Material Security...

info_outline
Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities show art Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities

Shared Security

Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals featuring voices of tech moguls. Our discussion covers how easily these systems can be compromised, the inadequate security measures currently in place, and the broader implications for critical infrastructure. Thanks to Material Security for...

info_outline
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths show art Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths

Shared Security

Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA's plans. We also discuss the broader implications for identity surveillance and who truly benefits from these security upgrades. We also discuss the problems faced by individuals with name changes and the challenges they face with REAL IDs. Plus, we explore the political and social ramifications of such security measures and why this might all just be 'security theater.' Show notes:

info_outline
 
More Episodes

In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple's decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the implications for both government and corporate security.

Show notes: https://sharedsecurity.net/2025/03/03/cybersecurity-impact-of-doge-apples-stand-against-encryption-backdoors/