Épisodes

  • DevelopmentTools May Allow Remote Compromise
    Dec 8 2025

    Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity

    In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, poses significant risks like remote code execution and malware deployment across numerous organizations. The episode also highlights flaws in AI coding tools discovered by researcher Ari Marzouk, which could compromise integrated development environments (IDEs) and software supply chains. Additionally, a ransomware breach at Marquis Software Solutions, impacting over 70 US banks and credit unions, is examined. Emphasis is placed on the critical need for robust security culture and proactive measures in the face of evolving threats.

    Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.

    You can find them at Meter.com/cst

    00:00 Introduction and Sponsor Message
    00:43 React Flaw Drama: A Deep Dive
    04:58 AI Coding Tools: New Vulnerabilities
    08:04 Ransomware Breach in Financial Sector
    10:27 Conclusion and Call to Action

    Voir plus Voir moins
    13 min
  • Cybersecurity Today Month In Review - December 5th, 2025
    Dec 6 2025

    Cybersecurity Today: The Rise of Living Off the Land Strategies & More

    In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where attackers use legitimate software to stay undetected, the risks associated with public Wi-Fi and QR codes, and the recent breaches involving Oracle's E-Business Suite and SonicWall's management devices. The panel also reflects on the often conflicting cybersecurity advice circulating today and emphasizes the importance of nuanced communication in security practices. Plus, find out who wins the 'Stinky' award for cybersecurity blunders and what you can do to stay safe. Special thanks to Meter for supporting this podcast. Tune in for a deep dive into these crucial cybersecurity topics and more.

    00:00 Introduction and Sponsor Message
    00:19 Welcome and Guest Introductions
    00:50 Unique Coffee Partnership
    02:27 Living Off the Land: Cybersecurity Tactics
    04:33 Social Engineering and AI Threats
    13:51 The Role of Social Media in Cyber Fraud
    20:05 Microsoft's New Teams Feature: A Security Risk?
    26:39 Oracle Vulnerability and Enterprise Security
    27:26 Patching Core Systems: Challenges and Necessities
    28:12 Clop Ransomware: A Persistent Threat
    29:09 University Data Breaches: The Case of U Penn
    30:18 Security Culture and Leadership Accountability
    33:49 Debunking Security Myths: Juice Jacking and QR Codes
    39:15 Public WiFi and VPNs: Proceed with Caution
    41:18 The Importance of Effective Cybersecurity Communication
    48:33 SonicWall Security Concerns and the Stinkies Awards
    51:13 Wrapping Up: Reflections and Future Episodes

    Voir plus Voir moins
    54 min
  • Shady Panda Hides For Years In Legitimate Browser Extensions: Cybersecurity Today
    Dec 5 2025

    In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additionally, the show explores a long-running campaign by 'Shady Panda,' which used browser extensions to harvest data, and an unexpected failure by Google's AI tool that led to the deletion of a developer's hard drive. The episode also thanks Meter for their continued support.

    00:00 Introduction and Sponsor Message
    00:48 React Vulnerability: React2Shell
    03:13 Microsoft's Long-Standing Shortcut Flaw
    04:50 Evilginx: Bypassing MFA in Education
    06:59 Shady Panda's Malicious Extensions
    09:13 Google's AI Mishap: Developer's Hard Drive Wiped
    11:01 Conclusion and Final Thoughts

    Voir plus Voir moins
    12 min
  • Living off the Land Attacks and Emerging Cyber Threats
    Dec 3 2025

    This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Suite vulnerabilities, and findings on AI jailbreaks tied to syntactic patterns by researchers from MIT, Northeastern University, and Meta. The episode emphasizes the ongoing challenges and evolving strategies in cybersecurity.

    00:00 Introduction and Sponsor Message
    00:43 Living Off the Land Attacks Explained
    03:41 Fake Calendly Invites and Phishing Campaigns
    05:47 Oracle Breach and Its Implications
    07:55 AI Jailbreaks and Syntax Hacking
    11:27 Conclusion and Final Thoughts

    Voir plus Voir moins
    13 min
  • Cybersecurity Today: QR Code Parking Scams, Evil Twin WiFi Attacks & Microsoft's Teams Flaw
    Dec 1 2025

    In this episode of Cybersecurity Today, host David Shipley discusses a range of pressing cybersecurity issues. Topics include the surge in QR code parking scams, with recent cases in Monaco, Ottawa, and across Europe; an Australian man sentenced for evil twin WiFi attacks targeting travelers; the shutdown of the Code Red emergency notification system due to ransomware; and critical vulnerabilities in Microsoft Teams' guest access feature. Shipley also examines the newly launched hacklore.org website aiming to debunk cybersecurity myths, while critiquing its dismissal of real-world threats. Stay informed on how criminals exploit simple deception, human assumptions, and technology lapses to perpetrate fraud and data breaches.

    00:00 Introduction and Sponsor Message
    00:21 Hack Lore vs. Real Cyber Threats
    03:45 QR Code Parking Scams
    07:24 Evil Twin WiFi Attacks
    09:43 Ransomware Attack on Code Red
    11:44 Microsoft Teams Security Flaw
    15:09 Conclusion and Final Thoughts

    Voir plus Voir moins
    19 min
  • Espionage and Intelligence - What Cybersecurity Professionals Can Learn
    Nov 28 2025

    The Intersection of Espionage Techniques and Cybersecurity Threats

    This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of Beauceron Security. They discuss the vulnerabilities in human behavior that can be exploited, the similarity between human intelligence operations and phishing attacks, and how AI is transforming the landscape of social engineering. Practical advice on recognizing and mitigating these threats is also provided. The episode underscores the importance of empathy, skepticism, and continuous education in defending against sophisticated cyber threats.

    00:00 Introduction and Sponsor Message
    00:25 Linking Espionage and Cybersecurity
    01:06 The Role of Social Engineering in Cyber Attacks
    02:25 Guest Introductions: Neil Bisson and David Shipley
    03:24 Recruitment Tactics in Intelligence
    05:56 Phishing vs. Intelligence Recruitment
    07:48 AI's Role in Modern Social Engineering
    10:45 Building Trust and Rapport in Intelligence
    16:19 Ethical Considerations in Intelligence Work
    20:01 Future of Cybersecurity and Social Engineering
    24:31 The Art of Subtle Manipulation
    26:01 Clandestine Tactics and Voluntary Information
    26:24 Incremental Trust Building
    26:46 Psychological Manipulation and Cult Recruitment
    27:34 Human Connection and Vulnerability
    28:53 AI and Social Engineering
    30:25 The Threat of AI in Recruitment
    33:20 Emotional Manipulation in Espionage
    36:19 Defending Against Manipulation
    38:12 Empathy and Information as Defense
    45:49 Final Thoughts and Audience Engagement

    Voir plus Voir moins
    48 min
  • Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
    Nov 27 2025

    In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding in Blender 3D models named SteelC, supply chain attacks in the JavaScript ecosystem through NPM packages with Shai-Hulud malware, and a phishing scam using lookalike domains to deceive Microsoft account holders. Listeners are reminded to manually type URLs to avoid phishing scams, and are informed about the Thanksgiving weekend schedule change.

    00:00 Introduction and Apology
    01:26 Cybersecurity Headlines
    02:13 US Banks Data Theft Incident
    03:44 Broadcom and Oracle ERP Breach
    05:29 Blender Malware Campaign
    07:45 Shai-Hulud NPM Package Attack
    09:41 Phishing Campaign Targeting Microsoft Accounts
    11:39 Final Thoughts and Thanksgiving Wishes

    Voir plus Voir moins
    13 min
  • Major US Bank Data Linked Through Breach At SitusAMC
    Nov 26 2025

    In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new malware campaign hides inside Blender 3D models, exploiting the auto-run feature to deploy Steel C malware. The JavaScript ecosystem faces a supply chain attack from the Shai-Hulud malware compromising 500 NPM packages. Additionally, a phishing campaign leveraging visual deception with look-alike domains is targeting Microsoft account holders. The show is brought to you by Meter, which provides integrated networking solutions.

    00:00 Introduction and Sponsor Message
    00:21 US Banks Data Theft Incident
    02:24 Broadcom and Oracle ERP Breach
    04:09 Blender Files Supply Chain Attack
    06:24 NPM Packages Compromised
    08:21 Phishing Campaign Targeting Microsoft Accounts
    10:19 Conclusion and Sponsor Message

    Voir plus Voir moins
    12 min