Episodios

  • Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
    Apr 2 2025

    In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several UK-based dating apps that led to the exposure of approximately 1.5 million private images. The discussion highlights how attackers are increasingly using legitimate software tools to bypass security measures, the implications of these breaches for users, and offers practical tips for maintaining robust cybersecurity.

    00:00 Introduction to Today's Cyber Security News
    00:29 Compromised Endpoint Detection and Response Systems
    01:06 Bypassing Windows Defender: Methods and Implications
    02:52 Ransomware Tactics and Legitimate Tool Exploits
    04:20 Time Traveling Attacks and EDR Limitations
    06:33 Massive Data Breach on X (Twitter)
    08:30 UK Dating Apps Expose Private Images
    10:47 Fraud Alerts and Scams
    13:25 Conclusion and Final Thoughts

    Más Menos
    14 m
  • Canadian Hacker Linked To Anonymous Charged In Texas GOP Hack: Cyber Security Today for March 31, 2025
    Mar 31 2025

    Cybersecurity Today: Hacktivism, Solar Power Vulnerabilities, and Global Phishing Challenges

    In this episode of Cybersecurity Today, host David Shipley covers multiple cybersecurity stories including: a Canadian hacker charged for the 2021 Texas GOP hack, vulnerabilities in solar power gear, France's national phishing test for students, and the tragic impact of online fraud in India. Shipley delves into the implications for cybersecurity professionals and emphasizes the need to destigmatize fraud and support victims.

    00:00 Introduction and Headlines
    00:25 Canadian Hacker Charged for Texas GOP Hack
    02:12 Vulnerabilities in Solar Power Gear
    02:56 France's National Phishing Simulation for Students
    04:19 Tragic Consequences of Online Fraud in India
    05:16 Rising Online Fraud and Its Impact in Canada
    06:15 Conclusion and Call to Action

    Más Menos
    7 m
  • Cyber Security Today Profile Series: Dr. Priscilla Johnson on Environmental Engineering, Water Strategy, and Cyber Intelligence
    Mar 29 2025

    In this episode, host Jim Love kicks off his new profile series with a deep dive into the compelling career of Dr. Priscilla Johnson, an environmental advocate at the crossroads of technology and sustainability. Dr. Johnson discusses her work in building a data center in South Africa amidst a severe drought, her tenure as Director of Water Strategy at Microsoft, and her transition into cyber intelligence. She explains how her unique background and empathetic approach have informed her career decisions and advocacy for responsible resource management. The conversation also touches on the importance of situational awareness in cybersecurity, making this episode a must-listen for anyone interested in the intersections of environmental engineering, infrastructure, and cybersecurity.

    00:00 Introduction to the Series
    00:29 Meet Dr. Priscilla Johnson
    00:54 Challenges of Building a Data Center in Africa
    01:16 Dr. Johnson's Background and Role at Microsoft
    02:38 Addressing the Water Crisis in South Africa
    06:34 Innovative Solutions and Collaborations
    19:12 Dr. Johnson's Journey into Environmental Engineering
    24:47 Discovering Texas and Dow Chemical
    25:15 Environmental Impact and Agent Orange
    27:00 Challenges in Environmental Management
    29:00 Maternity Leave and Data Issues
    34:46 Transition to Cybersecurity
    37:19 Cybersecurity Threats and Preparedness
    48:26 Mentorship and Career Advice
    53:20 Conclusion and Final Thoughts

    Más Menos
    54 m
  • Government Officials' Data Leaks: Cyber Security Today for Friday, March 18, 2025
    Mar 28 2025

    Exposing Security Flaws: Government Officials' Data Leaks, Defense Contractor Fines, and Cyber Crime Involvement

    In this episode of Cybersecurity Today, host Jim Love highlights significant cybersecurity breaches affecting US security officials, a government defense contractor, and a Department of Government Efficiency staffer. Personal information of senior US security officials was found accessible online, raising concerns about national security. Morse Corp, a defense contractor, was fined $4.6 million for failing to meet cybersecurity requirements. Additionally, a 19-year-old tech aide from the Department of Government Efficiency was found linked to a cyber crime group, causing alarm due to his recent advisory roles with significant government agencies. The episode underscores the need for stringent cybersecurity practices and accurate compliance within government and defense circles.

    00:00 Introduction and Headlines
    00:24 Exposure of US Security Officials' Personal Information
    02:22 US Defense Contractor's Cybersecurity Failures
    04:40 19-Year-Old Linked to Cyber Crime Ring
    07:05 Conclusion and Final Thoughts

    Más Menos
    8 m
  • Oracle Denies Hack Despite Hacker's Evidence: Cyber Security Today for March 26, 2025
    Mar 26 2025

    Oracle Denies Cloud Hack & Top Secret Military Leaks: Cybersecurity Today

    In today's episode of 'Cybersecurity Today,' host Jim Love delves into Oracle's denial of a claimed breach of its cloud systems, detailing the hacker's allegations and Oracle's firm response. Additionally, the episode explores an accidental leak of top-secret US military information to an editor at the Atlantic, revealing the astonishing lapses in secure communication. The show also covers renowned security expert Troy Hunt's phishing attack incident on his MailChimp account, highlighting vulnerabilities and lessons learned in cybersecurity. Stay tuned for comprehensive insights and expert analysis on these significant security events.

    00:00 Introduction and Oracle Cloud Breach Allegations
    00:52 Oracle's Response and Hacker Demands
    02:07 Classified Military Details Leaked to Journalist
    04:34 Troy Hunt's MailChimp Phishing Attack
    06:17 Lessons Learned and Final Thoughts
    07:38 Conclusion

    Más Menos
    8 m
  • Oracle Has One Of The Largest Supply Chain Breaches: Cyber Security Today For March 24, 2025
    Mar 24 2025

    In this episode of 'Cybersecurity Today,' host Jim Love covers several major cybersecurity events. A devastating breach at Oracle Cloud Infrastructure has exposed 6 million records affecting 140,000 businesses, linked to a threat actor known as Rose87168. The attack exploited vulnerabilities in Oracle Fusion Middleware 11G. New browser-in-the-middle attack techniques are discussed, which can steal data by bypassing multi-factor authentication. The episode also highlights a severe vulnerability in Synology's DiskStation Manager software that could allow remote attackers to take full control of affected systems. Lastly, significant budget cuts in the Cybersecurity and Infrastructure Security Agency’s (CISA) Red Team might weaken US government cyber defenses. Critical insights and mitigation strategies for these emerging threats are provided.

    00:00 Massive Oracle Supply Chain Attack
    03:08 Browser in the Middle Attack Explained
    06:03 Synology's Major Security Flaw
    08:08 US Government Red Team Disruptions
    10:31 Conclusion and Final Thoughts

    Más Menos
    11 m
  • The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions: Cyber Security Today
    Mar 22 2025

    The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions

    In this episode of 'Cybersecurity Today,' host Jim Love discusses the rising trends and severe impacts of cyber attacks on K-12 schools with Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security (CIS). They scrutinize recent studies showing a surge in cyber threats targeting educational institutions, emphasizing the vulnerability of schools and the motives behind these attacks. The discussion covers how cyber criminals exploit budgetary information and schedules to maximize impact, the profound repercussions of ransomware attacks on school communities, and the critical need for better cybersecurity practices and support. Randy Rose shares insights from the 2025 CIS MS-ISAC K-12 Cyber​security Report and offers practical advice on elevating security standards and fostering community resilience to protect sensitive school data from cyber threats.

    00:00 Introduction to Cybersecurity in Schools
    00:02 Iconic Hacking Movies and Real-Life Cyber Threats
    00:41 The Seriousness of School Cybersecurity
    01:10 Interview with Randy Rose: Introduction and CIS Overview
    01:40 CIS's Role and Randy's Journey
    03:27 Supporting Various Organizations
    04:26 Challenges Faced by Schools and Local Governments
    06:21 Cybersecurity Threats and Attack Patterns
    09:11 Impact of Cyber Attacks on Schools
    13:22 Detailed Findings from the CIS Report
    19:16 Human Factor in Cybersecurity
    19:29 Supply Chain and Data Security
    27:13 The Role of AI in Cybersecurity
    30:49 Ransomware and Its Devastating Effects
    32:27 Recommendations for Improving School Cybersecurity
    34:01 Conclusion and Final Thoughts

    Más Menos
    35 m
  • IBM's Operating System Is A Perfect 10 - In Terms of Cybersecurity Vulnerability. Cyber Security Today for March 21, 2025
    Mar 21 2025

    Cybersecurity Today: Critical IBM AIX Vulnerability and Major Browser Exploits Revealed

    In this episode, host Jim Love discusses pressing cybersecurity issues, including IBM's AIX operating system scoring a perfect 10 in security vulnerability, leaving critical sectors exposed to remote attacks. The episode also covers the mishandling of sensitive data by U.S. government agencies amid rapid layoffs, the viral exposure of dangerous browser exploits by YouTuber Matt Johansson, and the removal of over 300 malicious Android apps from the Google Play Store. Key recommendations for protecting against these threats are provided.

    00:00 Introduction to Cybersecurity News
    00:26 IBM AIX Vulnerabilities Exposed
    02:12 Government Layoffs and Security Risks
    04:02 Browser Exploits and Malicious Extensions
    06:39 Malicious Android Apps on Google Play
    08:45 Conclusion and Upcoming Topics

    Más Menos
    9 m