loader from loading.io

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development

Shared Security

Release Date: 05/05/2025

Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy show art Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy

Shared Security

Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and family safety, providing practical tips for recognizing unusual behavior, planning for emergencies, and teaching kids safety skills. The conversation also touches upon digital security and how situational awareness applies online. Learn how to own...

info_outline
Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us show art Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us

Shared Security

In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrome’s new (at the time) update designed to block resource-heavy ads, making browsing faster and safer. Finally, we look at Microsoft’s warning about foreign interference attempts targeting the 2020 U.S. election. What makes this episode...

info_outline
Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach show art Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach

Shared Security

In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attackers. The hosts discuss how the breach happened, its implications, and what organizations can do to protect themselves from similar threats. They also provide insights into Salesforce's security posture, the role of third-party integrations, and the...

info_outline
Convenience vs. Privacy: Can We Have Both? show art Convenience vs. Privacy: Can We Have Both?

Shared Security

In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips on using privacy-focused tools and making informed choices. Join the conversation in the comments or on Bluesky (@sharedsecurity). Show notes:

info_outline
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think show art Public Wi-Fi Myths: Why You’re Probably Safer Than You Think

Shared Security

Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what threats still exist, and when you might actually want to use a VPN. Show notes:

info_outline
The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages show art The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages

Shared Security

In this episode we're discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We'll discuss the role of sloppy coding, an exposed database, and the lack of security discipline that led to this massive leak. Join us as we explore insights from a cybersecurity researcher who disassembled the app's source code, the ensuing legal and privacy repercussions, and the broader implications for app...

info_outline
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous show art Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous

Shared Security

In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with these scams and using built-in filters and reporting options on your mobile device. Show notes:

info_outline
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis show art Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

Shared Security

This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss the implications of these events, the underlying issues with patching systems, and the complexities of protecting applications like SharePoint. Stay informed on the latest cybersecurity developments and get insights on what might have gone wrong....

info_outline
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate show art Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate

Shared Security

In this episode, we examine Amazon's Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation's recent report criticizes Ring's AI-first approach and the rollback of prior privacy reforms, describing it as 'techno authoritarianism.' We also discuss a recent scare among Ring users on May 28, related to an unexplained series of logins, said by Amazon to be a UI glitch. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore these issues, share personal anecdotes about their experiences with tech, and discuss broader implications for...

info_outline
Passwords and the Elderly: Why Writing Them Down Might Be OK show art Passwords and the Elderly: Why Writing Them Down Might Be OK

Shared Security

In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous anecdotes and touches on broader cybersecurity issues such as risk assessment and the importance of tailoring security solutions to individual needs. Tune in for insights on making security accessible and effective for an often overlooked group. Show...

info_outline
 
More Episodes

Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like 'vibe coding' — a novel, behavior-focused development approach, and 'MCP' (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of 'slopsquatting,' a new type of threat involving AI-generated package names. Our co-hosts Scott Wright and Kevin Johnson discuss these topics, share personal insights, and ponder the future of coding in the AI era. Additionally, we draw some intriguing parallels between AI advancements and past practices, highlighting the need for oversight and security in this evolving landscape.

Show notes: https://sharedsecurity.net/2025/05/05/what-vibe-coding-mcp-and-slopsquatting-reveal-about-the-future-of-ai-development/