<?xml version="1.0" encoding="UTF-8"?><!-- generator="podbean/5.5" -->
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
     xmlns:spotify="http://www.spotify.com/ns/rss"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:media="http://search.yahoo.com/mrss/">

<channel>
    <title>Cyberside Chats: Cybersecurity Insights from the Experts</title>
    <atom:link href="https://www.chatcyberside.com/feed.xml" rel="self" type="application/rss+xml"/>
    <link>https://www.chatcyberside.com</link>
    <description><![CDATA[<p>Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!</p>
<p></p>
<p><strong>Join us monthly for an interactive Cyberside Chats: Live! Our next session will be announced soon.<br /></strong></p>]]></description>
    <pubDate>Tue, 03 Mar 2026 06:30:00 -0500</pubDate>
    <generator>https://podbean.com/?v=5.5</generator>
    <language>en</language>
        <copyright>Copyright 2024 All rights reserved.</copyright>
    <category>Technology</category>
    <ttl>1440</ttl>
    <itunes:type>episodic</itunes:type>
          <itunes:summary>Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast on Tuesdays at 6:30 am ET and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!</itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
<itunes:category text="Technology" />
	<itunes:category text="News">
		<itunes:category text="Tech News" />
	</itunes:category>
	<itunes:category text="Business">
		<itunes:category text="Management" />
	</itunes:category>
    <itunes:owner>
        <itunes:name>Chatcyberside</itunes:name>
            </itunes:owner>
    	<itunes:block>No</itunes:block>
	<itunes:explicit>false</itunes:explicit>
	<itunes:new-feed-url>https://www.chatcyberside.com/feed.xml</itunes:new-feed-url>
    <itunes:image href="https://pbcdn1.podbean.com/imglogo/image-logo/19905215/Cyberside-Logo-3000px_1_91wyj.jpg" />
    <image>
        <url>https://pbcdn1.podbean.com/imglogo/image-logo/19905215/Cyberside-Logo-3000px_1_91wyj.jpg</url>
        <title>Cyberside Chats: Cybersecurity Insights from the Experts</title>
        <link>https://www.chatcyberside.com</link>
        <width>144</width>
        <height>144</height>
    </image>
    <item>
        <title>Google Gemini Changed the Rules: Are Your API Keys Exposed?</title>
        <itunes:title>Google Gemini Changed the Rules: Are Your API Keys Exposed?</itunes:title>
        <link>https://www.chatcyberside.com/e/retroactive-risk-google-turns-public-api-keys-into-billable-secrets/</link>
                    <comments>https://www.chatcyberside.com/e/retroactive-risk-google-turns-public-api-keys-into-billable-secrets/#comments</comments>        <pubDate>Tue, 03 Mar 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/b6005f5a-9a68-30fc-accd-4991e8f2df78</guid>
                                    <description><![CDATA[<p>For years, many Google API keys were treated as “public” project identifiers embedded in client-side code and protected mainly through referrer and API restrictions. But a recent discovery suggests Gemini changes that risk model: researchers found nearly 3,000 publicly exposed Google API keys that were still “live” and could be used to interact with Gemini endpoints, creating a new path to unauthorized usage, quota exhaustion, and potentially costly API charges.</p>
<p>In this episode of Cyberside Chats, we unpack what “changed the rules” actually means, why this is a classic cloud governance problem (old assumptions meeting new capabilities), and what to check right now. The bottom line: AI features are quietly expanding the blast radius of credentials you never intended to treat as secrets.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Audit legacy API keys before and after enabling AI services - Inventory every API key across your cloud projects and confirm it is still required, properly scoped, and has a clear owner. Treat AI enablement as a formal trigger event to reassess any previously published or embedded keys in that same project.</p>
<p>2. Treat API keys as sensitive credentials in the AI era - Even if a vendor once described a key as “not a secret,” AI endpoints materially increase financial and potential data exposure risk. Apply rotation, monitoring, strict quotas, and real-time billing alerts accordingly.</p>
<p>3. Enforce least privilege at the API level - Referrer or IP restrictions alone are insufficient. Every key should be explicitly limited to only the APIs it requires. “Allow all APIs” should not exist in production.</p>
<p>4. Isolate AI development from production application projects - Avoid enabling AI services in long-lived projects that contain public-facing keys. Use separate projects, accounts, or subscriptions for AI experimentation and production workloads to reduce blast radius and cost exposure.</p>
<p>5. Update third-party risk management to include AI-driven credential and cost risk - Ask vendors how API keys are scoped, restricted, rotated, and monitored especially for AI services. Confirm that AI environments are isolated from production systems and that abnormal AI usage or billing spikes are actively monitored.</p>
<p> </p>
<p>Resources:</p>
<p>1. Google API Keys Weren’t Secrets. But then Gemini Changed the Rules (Truffle Security)</p>
<p><a href='https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules'>https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules </a></p>
<p>2. Previously harmless Google API keys now expose Gemini AI data (BleepingComputer)</p>
<p><a href='https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/'>https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/ </a></p>
<p>3. DEF CON 31 – “Private Keys in Public Places” (Tom Pohl) (YouTube) <a href='https://www.youtube.com/watch?v=7t_ntuSXniw'>https://www.youtube.com/watch?v=7t_ntuSXniw </a></p>
<p>4. Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security (LMG Security)</p>
<p><a href='https://www.lmgsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security'>https://www.lmgsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security </a></p>
<p>5. Google Cloud docs: API keys overview &amp; best practices (Google) <a href='https://docs.cloud.google.com/api-keys/docs/overview'>https://docs.cloud.google.com/api-keys/docs/overview</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>For years, many Google API keys were treated as “public” project identifiers embedded in client-side code and protected mainly through referrer and API restrictions. But a recent discovery suggests Gemini changes that risk model: researchers found nearly 3,000 publicly exposed Google API keys that were still “live” and could be used to interact with Gemini endpoints, creating a new path to unauthorized usage, quota exhaustion, and potentially costly API charges.</p>
<p>In this episode of Cyberside Chats, we unpack what “changed the rules” actually means, why this is a classic cloud governance problem (old assumptions meeting new capabilities), and what to check right now. The bottom line: AI features are quietly expanding the blast radius of credentials you never intended to treat as secrets.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Audit legacy API keys before and after enabling AI services - Inventory every API key across your cloud projects and confirm it is still required, properly scoped, and has a clear owner. Treat AI enablement as a formal trigger event to reassess any previously published or embedded keys in that same project.</p>
<p>2. Treat API keys as sensitive credentials in the AI era - Even if a vendor once described a key as “not a secret,” AI endpoints materially increase financial and potential data exposure risk. Apply rotation, monitoring, strict quotas, and real-time billing alerts accordingly.</p>
<p>3. Enforce least privilege at the API level - Referrer or IP restrictions alone are insufficient. Every key should be explicitly limited to only the APIs it requires. “Allow all APIs” should not exist in production.</p>
<p>4. Isolate AI development from production application projects - Avoid enabling AI services in long-lived projects that contain public-facing keys. Use separate projects, accounts, or subscriptions for AI experimentation and production workloads to reduce blast radius and cost exposure.</p>
<p>5. Update third-party risk management to include AI-driven credential and cost risk - Ask vendors how API keys are scoped, restricted, rotated, and monitored especially for AI services. Confirm that AI environments are isolated from production systems and that abnormal AI usage or billing spikes are actively monitored.</p>
<p> </p>
<p>Resources:</p>
<p>1. Google API Keys Weren’t Secrets. But then Gemini Changed the Rules (Truffle Security)</p>
<p><a href='https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules'>https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules </a></p>
<p>2. Previously harmless Google API keys now expose Gemini AI data (BleepingComputer)</p>
<p><a href='https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/'>https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/ </a></p>
<p>3. DEF CON 31 – “Private Keys in Public Places” (Tom Pohl) (YouTube) <a href='https://www.youtube.com/watch?v=7t_ntuSXniw'>https://www.youtube.com/watch?v=7t_ntuSXniw </a></p>
<p>4. Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security (LMG Security)</p>
<p><a href='https://www.lmgsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security'>https://www.lmgsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security </a></p>
<p>5. Google Cloud docs: API keys overview &amp; best practices (Google) <a href='https://docs.cloud.google.com/api-keys/docs/overview'>https://docs.cloud.google.com/api-keys/docs/overview</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2pry3m9qcyzwfmyx/EP62_-_Gemini_API_Audio_only89ip1-nbup3r-Optimized.mp3" length="12229186" type="audio/mpeg"/>
        <itunes:summary><![CDATA[For years, many Google API keys were treated as “public” project identifiers embedded in client-side code and protected mainly through referrer and API restrictions. But a recent discovery suggests Gemini changes that risk model: researchers found nearly 3,000 publicly exposed Google API keys that were still “live” and could be used to interact with Gemini endpoints, creating a new path to unauthorized usage, quota exhaustion, and potentially costly API charges.
In this episode of Cyberside Chats, we unpack what “changed the rules” actually means, why this is a classic cloud governance problem (old assumptions meeting new capabilities), and what to check right now. The bottom line: AI features are quietly expanding the blast radius of credentials you never intended to treat as secrets.
 
Key Takeaways
1. Audit legacy API keys before and after enabling AI services - Inventory every API key across your cloud projects and confirm it is still required, properly scoped, and has a clear owner. Treat AI enablement as a formal trigger event to reassess any previously published or embedded keys in that same project.
2. Treat API keys as sensitive credentials in the AI era - Even if a vendor once described a key as “not a secret,” AI endpoints materially increase financial and potential data exposure risk. Apply rotation, monitoring, strict quotas, and real-time billing alerts accordingly.
3. Enforce least privilege at the API level - Referrer or IP restrictions alone are insufficient. Every key should be explicitly limited to only the APIs it requires. “Allow all APIs” should not exist in production.
4. Isolate AI development from production application projects - Avoid enabling AI services in long-lived projects that contain public-facing keys. Use separate projects, accounts, or subscriptions for AI experimentation and production workloads to reduce blast radius and cost exposure.
5. Update third-party risk management to include AI-driven credential and cost risk - Ask vendors how API keys are scoped, restricted, rotated, and monitored especially for AI services. Confirm that AI environments are isolated from production systems and that abnormal AI usage or billing spikes are actively monitored.
 
Resources:
1. Google API Keys Weren’t Secrets. But then Gemini Changed the Rules (Truffle Security)
https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules 
2. Previously harmless Google API keys now expose Gemini AI data (BleepingComputer)
https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/ 
3. DEF CON 31 – “Private Keys in Public Places” (Tom Pohl) (YouTube) https://www.youtube.com/watch?v=7t_ntuSXniw 
4. Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security (LMG Security)
https://www.lmgsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security 
5. Google Cloud docs: API keys overview &amp; best practices (Google) https://docs.cloud.google.com/api-keys/docs/overview
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>726</itunes:duration>
                <itunes:episode>63</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/sgf5sewx9d786pyj/EP62_-_Gemini_API_Audio_only89ip1-nbup3r-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/rj8u69b6wzvu7sfj/EP62_-_Gemini_API_Audio_only89ip1-nbup3r-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Opus 4.6: Changing the Pace of Software Exploitation Description</title>
        <itunes:title>Opus 4.6: Changing the Pace of Software Exploitation Description</itunes:title>
        <link>https://www.chatcyberside.com/e/ai-vs-software-the-new-age-of-vulnerability-hunting/</link>
                    <comments>https://www.chatcyberside.com/e/ai-vs-software-the-new-age-of-vulnerability-hunting/#comments</comments>        <pubDate>Tue, 24 Feb 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/c19f1ec1-a972-3611-960e-ad92bcc89612</guid>
                                    <description><![CDATA[<p>Claude Opus 4.6 is generating serious buzz for one reason: it can rapidly spot zero-day vulnerabilities out of the box, suggesting that long-trusted software may no longer be as “safe by default” as security teams assume.</p>
<p>At the same time, Microsoft’s February patch cycle included an unusually high number of zero-days already under active exploitation — real-world evidence that the race is already accelerating, and the window between discovery and impact is shrinking.</p>
<p>In this Cyberside Chats Live, we’ll connect the dots on what this means for defenders in 2026: a shrinking window between discovery and exploitation, shifting assumptions about “well-tested” software, and practical ways to rethink patch prioritization, detection, and exposure management.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>1. Plan for exploitation before disclosure - The era of negative-day vulnerabilities is here, flaws that may be discovered and weaponized before the broader security community even knows they exist. Assume exploitation could precede public advisories. Build response models around mitigation speed, not just patch timelines.</p>
<p>2. Prioritize exposure, not just severity - In a compressed exploit cycle, CVSS alone won’t protect you. Focus first on internet-facing systems, identity infrastructure, and high-privilege assets. If you cannot quickly identify what is externally reachable, that visibility gap becomes strategic risk.</p>
<p>3. Assume compromise on exposed assets and monitor accordingly - If attackers can exploit vulnerabilities before the world knows they exist, you may be compromised without a CVE to point to. Increase monitoring on internet-facing systems and critical apps for signs of intrusion: unexpected processes, new admin accounts, unusual authentication patterns, suspicious outbound connections, and persistence mechanisms.</p>
<p>4. Treat compensating controls as first-line defense - When patches aren’t available or cannot be deployed immediately rapid mitigations matter. Restrict access, disable vulnerable features, deploy firewall and WAF protections, and tighten segmentation. Mitigation agility should be operational, tested, and pre-authorized.</p>
<p>5. Prepare for containment patches may not exist - If exploitation is confirmed and no fix is available, leadership decisions must happen quickly. Define in advance who can isolate systems, disable services, revoke credentials, or temporarily disrupt operations. Shorten containment decision cycles before you need them.</p>
<p>6. Rehearse a “negative-day” tabletop - Run a scenario where exploitation is active, no patch exists, and public disclosure hasn’t occurred. Measure how fast you can reduce exposure, hunt internally, and communicate with executives. This exercise will expose friction points that policies alone will not.</p>
<p>7. Integrate AI into your vendor risk model - If AI is accelerating vulnerability discovery and code generation, your third parties are likely using it too. Update vendor due diligence to assess how AI-generated code is reviewed, secured, and tested. Ask about model governance, secure development controls, and vulnerability response timelines. If you lack visibility into how vendors manage AI risk, that gap becomes part of your attack surface.</p>
<p> </p>
<p>Resources:</p>
<p>1. Anthropic – Evaluating and Mitigating the Growing Risk of LLM-Discovered 0-Days (Feb 5, 2026) <a href='https://red.anthropic.com/2026/zero-days/'>https://red.anthropic.com/2026/zero-days/ </a></p>
<p>2. Zero Day Initiative – February 2026 Security Update Review <a href='https://www.zerodayinitiative.com/blog/2026/2/10/the-february-2026-security-update-review'>https://www.zerodayinitiative.com/blog/2026/2/10/the-february-2026-security-update-review </a></p>
<p>3. SecurityWeek – 6 Actively Exploited Zero-Days Patched by Microsoft (Feb 2026) <a href='https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/'>https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/ </a></p>
<p>4. Tenable – Claude Opus and AI-Driven Vulnerability Discovery Analysis <a href='https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity'>https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity </a></p>
<p>5. OpenAI releases crypto security tool as Claude blamed for $2.7m Moonwell bug</p>
<p><a href='https://www.dlnews.com/articles/defi/openai-releases-crypto-security-tool/'>https://www.dlnews.com/articles/defi/openai-releases-crypto-security-tool/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Claude Opus 4.6 is generating serious buzz for one reason: it can rapidly spot zero-day vulnerabilities out of the box, suggesting that long-trusted software may no longer be as “safe by default” as security teams assume.</p>
<p>At the same time, Microsoft’s February patch cycle included an unusually high number of zero-days already under active exploitation — real-world evidence that the race is already accelerating, and the window between discovery and impact is shrinking.</p>
<p>In this Cyberside Chats Live, we’ll connect the dots on what this means for defenders in 2026: a shrinking window between discovery and exploitation, shifting assumptions about “well-tested” software, and practical ways to rethink patch prioritization, detection, and exposure management.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>1. Plan for exploitation before disclosure - The era of negative-day vulnerabilities is here, flaws that may be discovered and weaponized before the broader security community even knows they exist. Assume exploitation could precede public advisories. Build response models around mitigation speed, not just patch timelines.</p>
<p>2. Prioritize exposure, not just severity - In a compressed exploit cycle, CVSS alone won’t protect you. Focus first on internet-facing systems, identity infrastructure, and high-privilege assets. If you cannot quickly identify what is externally reachable, that visibility gap becomes strategic risk.</p>
<p>3. Assume compromise on exposed assets and monitor accordingly - If attackers can exploit vulnerabilities before the world knows they exist, you may be compromised without a CVE to point to. Increase monitoring on internet-facing systems and critical apps for signs of intrusion: unexpected processes, new admin accounts, unusual authentication patterns, suspicious outbound connections, and persistence mechanisms.</p>
<p>4. Treat compensating controls as first-line defense - When patches aren’t available or cannot be deployed immediately rapid mitigations matter. Restrict access, disable vulnerable features, deploy firewall and WAF protections, and tighten segmentation. Mitigation agility should be operational, tested, and pre-authorized.</p>
<p>5. Prepare for containment patches may not exist - If exploitation is confirmed and no fix is available, leadership decisions must happen quickly. Define in advance who can isolate systems, disable services, revoke credentials, or temporarily disrupt operations. Shorten containment decision cycles before you need them.</p>
<p>6. Rehearse a “negative-day” tabletop - Run a scenario where exploitation is active, no patch exists, and public disclosure hasn’t occurred. Measure how fast you can reduce exposure, hunt internally, and communicate with executives. This exercise will expose friction points that policies alone will not.</p>
<p>7. Integrate AI into your vendor risk model - If AI is accelerating vulnerability discovery and code generation, your third parties are likely using it too. Update vendor due diligence to assess how AI-generated code is reviewed, secured, and tested. Ask about model governance, secure development controls, and vulnerability response timelines. If you lack visibility into how vendors manage AI risk, that gap becomes part of your attack surface.</p>
<p> </p>
<p>Resources:</p>
<p>1. Anthropic – Evaluating and Mitigating the Growing Risk of LLM-Discovered 0-Days (Feb 5, 2026) <a href='https://red.anthropic.com/2026/zero-days/'>https://red.anthropic.com/2026/zero-days/ </a></p>
<p>2. Zero Day Initiative – February 2026 Security Update Review <a href='https://www.zerodayinitiative.com/blog/2026/2/10/the-february-2026-security-update-review'>https://www.zerodayinitiative.com/blog/2026/2/10/the-february-2026-security-update-review </a></p>
<p>3. SecurityWeek – 6 Actively Exploited Zero-Days Patched by Microsoft (Feb 2026) <a href='https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/'>https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/ </a></p>
<p>4. Tenable – Claude Opus and AI-Driven Vulnerability Discovery Analysis <a href='https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity'>https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity </a></p>
<p>5. OpenAI releases crypto security tool as Claude blamed for $2.7m Moonwell bug</p>
<p><a href='https://www.dlnews.com/articles/defi/openai-releases-crypto-security-tool/'>https://www.dlnews.com/articles/defi/openai-releases-crypto-security-tool/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3hqcvw9cc87akvsb/CC_EP61-change_pace-n8s6d2-Optimized.mp3" length="25020599" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Claude Opus 4.6 is generating serious buzz for one reason: it can rapidly spot zero-day vulnerabilities out of the box, suggesting that long-trusted software may no longer be as “safe by default” as security teams assume.
At the same time, Microsoft’s February patch cycle included an unusually high number of zero-days already under active exploitation — real-world evidence that the race is already accelerating, and the window between discovery and impact is shrinking.
In this Cyberside Chats Live, we’ll connect the dots on what this means for defenders in 2026: a shrinking window between discovery and exploitation, shifting assumptions about “well-tested” software, and practical ways to rethink patch prioritization, detection, and exposure management.
 
Key Takeaways:
1. Plan for exploitation before disclosure - The era of negative-day vulnerabilities is here, flaws that may be discovered and weaponized before the broader security community even knows they exist. Assume exploitation could precede public advisories. Build response models around mitigation speed, not just patch timelines.
2. Prioritize exposure, not just severity - In a compressed exploit cycle, CVSS alone won’t protect you. Focus first on internet-facing systems, identity infrastructure, and high-privilege assets. If you cannot quickly identify what is externally reachable, that visibility gap becomes strategic risk.
3. Assume compromise on exposed assets and monitor accordingly - If attackers can exploit vulnerabilities before the world knows they exist, you may be compromised without a CVE to point to. Increase monitoring on internet-facing systems and critical apps for signs of intrusion: unexpected processes, new admin accounts, unusual authentication patterns, suspicious outbound connections, and persistence mechanisms.
4. Treat compensating controls as first-line defense - When patches aren’t available or cannot be deployed immediately rapid mitigations matter. Restrict access, disable vulnerable features, deploy firewall and WAF protections, and tighten segmentation. Mitigation agility should be operational, tested, and pre-authorized.
5. Prepare for containment patches may not exist - If exploitation is confirmed and no fix is available, leadership decisions must happen quickly. Define in advance who can isolate systems, disable services, revoke credentials, or temporarily disrupt operations. Shorten containment decision cycles before you need them.
6. Rehearse a “negative-day” tabletop - Run a scenario where exploitation is active, no patch exists, and public disclosure hasn’t occurred. Measure how fast you can reduce exposure, hunt internally, and communicate with executives. This exercise will expose friction points that policies alone will not.
7. Integrate AI into your vendor risk model - If AI is accelerating vulnerability discovery and code generation, your third parties are likely using it too. Update vendor due diligence to assess how AI-generated code is reviewed, secured, and tested. Ask about model governance, secure development controls, and vulnerability response timelines. If you lack visibility into how vendors manage AI risk, that gap becomes part of your attack surface.
 
Resources:
1. Anthropic – Evaluating and Mitigating the Growing Risk of LLM-Discovered 0-Days (Feb 5, 2026) https://red.anthropic.com/2026/zero-days/ 
2. Zero Day Initiative – February 2026 Security Update Review https://www.zerodayinitiative.com/blog/2026/2/10/the-february-2026-security-update-review 
3. SecurityWeek – 6 Actively Exploited Zero-Days Patched by Microsoft (Feb 2026) https://www.securityweek.com/6-actively-exploited-zero-days-patched-by-microsoft-with-february-2026-updates/ 
4. Tenable – Claude Opus and AI-Driven Vulnerability Discovery Analysis https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity 
5. OpenAI releases crypto security tool as Claude blamed for $2.7m Moonwell bug
https://www.dlnews.com/art]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1526</itunes:duration>
                <itunes:episode>62</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/rp7rcuhwa4ukmmdv/CC_EP61-change_pace-n8s6d2-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/rnqc3p2f24wwwka4/CC_EP61-change_pace-n8s6d2-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Nancy Guthrie’s Recovered Footage: The Reality of Residual Data</title>
        <itunes:title>Nancy Guthrie’s Recovered Footage: The Reality of Residual Data</itunes:title>
        <link>https://www.chatcyberside.com/e/cloud-footprints-the-nancy-guthrie-doorbell-mystery/</link>
                    <comments>https://www.chatcyberside.com/e/cloud-footprints-the-nancy-guthrie-doorbell-mystery/#comments</comments>        <pubDate>Tue, 17 Feb 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/d09e0952-cf1e-3e99-bd42-3a7f4d0cb2cd</guid>
                                    <description><![CDATA[<p>After the FBI announced it recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, one thing became clear: in releasing the footage, authorities revealed an important truth — deleted surveillance footage may not really be deleted. That means law enforcement (or threat actors) could potentially access it.</p>
<p>The case remains ongoing and deeply serious. For enterprise security leaders, the lesson is bigger than a consumer camera: modern systems often retain residual data across devices, local buffers, and vendor backends, even when teams believe it has been removed. In this episode of Cyberside Chats, we examine what that means for corporate environments, including IoT and physical security systems, data retention and legal exposure, vendor access models, and incident response realities when “deleted” data can still be recovered.</p>
<p>This case underscores a complex reality: data can remain accessible long after we believe it’s gone: sometimes a source of risk, and sometimes invaluable.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>1. Treat vendors as part of your data perimeter - Review contracts and platform settings to understand who can access footage or logs, what “support access” entails, what data is retained in backend systems, and how data is handled during incident response or legal requests.</p>
<p>2. Control encryption keys and access paths - Know who holds encryption keys, how administrative access is granted and monitored, and whether “end-to-end encryption” claims align with your threat model and regulatory requirements.</p>
<p>3. Include IoT and security devices in your data inventory - Cameras, badge systems, and smart building technology are data systems. Document on-device storage, cloud sync behavior, local buffers, and backend retention — not just cloud repositories.</p>
<p>4. Align retention decisions with legal and regulatory risk - Longer retention may aid investigations but increases eDiscovery scope, breach exposure, and privacy obligations. Retention should be a deliberate business risk decision made with Legal and Compliance.</p>
<p>5. Test whether deletion actually works - Validate purge workflows across vendor platforms and internal systems, including backups and disaster recovery, because “logical deletion” often isn’t “forensic deletion.” Build policies around how long data persists in replicas, backups, buffers, and vendor systems — and plan accordingly in both incident response and governance strategy.</p>
<p> </p>
<p>Resources:</p>
<p>1. Tom’s Guide – How did the FBI get Nancy Guthrie’s Google Nest camera footage if it was disabled — and what does it mean for your privacy? <a href='https://www.tomsguide.com/computing/online-security/how-did-the-fbi-get-nancy-guthries-google-nest-camera-footage-if-it-was-disabled-and-what-does-it-mean-for-your-privacy'>https://www.tomsguide.com/computing/online-security/how-did-the-fbi-get-nancy-guthries-google-nest-camera-footage-if-it-was-disabled-and-what-does-it-mean-for-your-privacy </a></p>
<p>2. CNET – Amazon’s Ring cameras push deeper into police and government surveillance <a href='https://www.cnet.com/home/security/amazons-ring-cameras-push-deeper-into-police-and-government-surveillance/'>https://www.cnet.com/home/security/amazons-ring-cameras-push-deeper-into-police-and-government-surveillance/ </a></p>
<p>3.NBC News – Ring doorbell camera employees mishandled customer videos, FTC says <a href='https://www.nbcnews.com/business/consumer/ring-doorbell-camera-employees-mishandled-customer-videos-rcna87103'>https://www.nbcnews.com/business/consumer/ring-doorbell-camera-employees-mishandled-customer-videos-rcna87103 </a></p>
<p>4. Federal Trade Commission – Ring Refunds <a href='https://www.ftc.gov/enforcement/refunds/ring-refunds'>https://www.ftc.gov/enforcement/refunds/ring-refunds </a></p>
<p>5. R Street Institute – Apple pulls end-to-end encryption feature from UK after demands for law enforcement access <a href='https://www.rstreet.org/commentary/apple-pulls-end-to-end-encryption-feature-from-uk-after-demands-for-law-enforcement-access/'>https://www.rstreet.org/commentary/apple-pulls-end-to-end-encryption-feature-from-uk-after-demands-for-law-enforcement-access/ </a></p>
<p>6. Exposing the Secret Office 365 Forensics Tool – An ethical crisis in the digital forensics industry came to a head last week with the release of new details on Microsoft’s undocumented “Activities” API. <a href='https://www.lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/'>https://www.lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>After the FBI announced it recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, one thing became clear: in releasing the footage, authorities revealed an important truth — deleted surveillance footage may not really be deleted. That means law enforcement (or threat actors) could potentially access it.</p>
<p>The case remains ongoing and deeply serious. For enterprise security leaders, the lesson is bigger than a consumer camera: modern systems often retain residual data across devices, local buffers, and vendor backends, even when teams believe it has been removed. In this episode of Cyberside Chats, we examine what that means for corporate environments, including IoT and physical security systems, data retention and legal exposure, vendor access models, and incident response realities when “deleted” data can still be recovered.</p>
<p>This case underscores a complex reality: data can remain accessible long after we believe it’s gone: sometimes a source of risk, and sometimes invaluable.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>1. Treat vendors as part of your data perimeter - Review contracts and platform settings to understand who can access footage or logs, what “support access” entails, what data is retained in backend systems, and how data is handled during incident response or legal requests.</p>
<p>2. Control encryption keys and access paths - Know who holds encryption keys, how administrative access is granted and monitored, and whether “end-to-end encryption” claims align with your threat model and regulatory requirements.</p>
<p>3. Include IoT and security devices in your data inventory - Cameras, badge systems, and smart building technology are data systems. Document on-device storage, cloud sync behavior, local buffers, and backend retention — not just cloud repositories.</p>
<p>4. Align retention decisions with legal and regulatory risk - Longer retention may aid investigations but increases eDiscovery scope, breach exposure, and privacy obligations. Retention should be a deliberate business risk decision made with Legal and Compliance.</p>
<p>5. Test whether deletion actually works - Validate purge workflows across vendor platforms and internal systems, including backups and disaster recovery, because “logical deletion” often isn’t “forensic deletion.” Build policies around how long data persists in replicas, backups, buffers, and vendor systems — and plan accordingly in both incident response and governance strategy.</p>
<p> </p>
<p>Resources:</p>
<p>1. Tom’s Guide – How did the FBI get Nancy Guthrie’s Google Nest camera footage if it was disabled — and what does it mean for your privacy? <a href='https://www.tomsguide.com/computing/online-security/how-did-the-fbi-get-nancy-guthries-google-nest-camera-footage-if-it-was-disabled-and-what-does-it-mean-for-your-privacy'>https://www.tomsguide.com/computing/online-security/how-did-the-fbi-get-nancy-guthries-google-nest-camera-footage-if-it-was-disabled-and-what-does-it-mean-for-your-privacy </a></p>
<p>2. CNET – Amazon’s Ring cameras push deeper into police and government surveillance <a href='https://www.cnet.com/home/security/amazons-ring-cameras-push-deeper-into-police-and-government-surveillance/'>https://www.cnet.com/home/security/amazons-ring-cameras-push-deeper-into-police-and-government-surveillance/ </a></p>
<p>3.NBC News – Ring doorbell camera employees mishandled customer videos, FTC says <a href='https://www.nbcnews.com/business/consumer/ring-doorbell-camera-employees-mishandled-customer-videos-rcna87103'>https://www.nbcnews.com/business/consumer/ring-doorbell-camera-employees-mishandled-customer-videos-rcna87103 </a></p>
<p>4. Federal Trade Commission – Ring Refunds <a href='https://www.ftc.gov/enforcement/refunds/ring-refunds'>https://www.ftc.gov/enforcement/refunds/ring-refunds </a></p>
<p>5. R Street Institute – Apple pulls end-to-end encryption feature from UK after demands for law enforcement access <a href='https://www.rstreet.org/commentary/apple-pulls-end-to-end-encryption-feature-from-uk-after-demands-for-law-enforcement-access/'>https://www.rstreet.org/commentary/apple-pulls-end-to-end-encryption-feature-from-uk-after-demands-for-law-enforcement-access/ </a></p>
<p>6. Exposing the Secret Office 365 Forensics Tool – An ethical crisis in the digital forensics industry came to a head last week with the release of new details on Microsoft’s undocumented “Activities” API. <a href='https://www.lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/'>https://www.lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zudzv8mm34y92cfd/audio_EP60_-_nancy_guthrie_v2bcufr-zvwpdg-Optimized.mp3" length="15308229" type="audio/mpeg"/>
        <itunes:summary><![CDATA[After the FBI announced it recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, one thing became clear: in releasing the footage, authorities revealed an important truth — deleted surveillance footage may not really be deleted. That means law enforcement (or threat actors) could potentially access it.
The case remains ongoing and deeply serious. For enterprise security leaders, the lesson is bigger than a consumer camera: modern systems often retain residual data across devices, local buffers, and vendor backends, even when teams believe it has been removed. In this episode of Cyberside Chats, we examine what that means for corporate environments, including IoT and physical security systems, data retention and legal exposure, vendor access models, and incident response realities when “deleted” data can still be recovered.
This case underscores a complex reality: data can remain accessible long after we believe it’s gone: sometimes a source of risk, and sometimes invaluable.
 
Key Takeaways:
1. Treat vendors as part of your data perimeter - Review contracts and platform settings to understand who can access footage or logs, what “support access” entails, what data is retained in backend systems, and how data is handled during incident response or legal requests.
2. Control encryption keys and access paths - Know who holds encryption keys, how administrative access is granted and monitored, and whether “end-to-end encryption” claims align with your threat model and regulatory requirements.
3. Include IoT and security devices in your data inventory - Cameras, badge systems, and smart building technology are data systems. Document on-device storage, cloud sync behavior, local buffers, and backend retention — not just cloud repositories.
4. Align retention decisions with legal and regulatory risk - Longer retention may aid investigations but increases eDiscovery scope, breach exposure, and privacy obligations. Retention should be a deliberate business risk decision made with Legal and Compliance.
5. Test whether deletion actually works - Validate purge workflows across vendor platforms and internal systems, including backups and disaster recovery, because “logical deletion” often isn’t “forensic deletion.” Build policies around how long data persists in replicas, backups, buffers, and vendor systems — and plan accordingly in both incident response and governance strategy.
 
Resources:
1. Tom’s Guide – How did the FBI get Nancy Guthrie’s Google Nest camera footage if it was disabled — and what does it mean for your privacy? https://www.tomsguide.com/computing/online-security/how-did-the-fbi-get-nancy-guthries-google-nest-camera-footage-if-it-was-disabled-and-what-does-it-mean-for-your-privacy 
2. CNET – Amazon’s Ring cameras push deeper into police and government surveillance https://www.cnet.com/home/security/amazons-ring-cameras-push-deeper-into-police-and-government-surveillance/ 
3.NBC News – Ring doorbell camera employees mishandled customer videos, FTC says https://www.nbcnews.com/business/consumer/ring-doorbell-camera-employees-mishandled-customer-videos-rcna87103 
4. Federal Trade Commission – Ring Refunds https://www.ftc.gov/enforcement/refunds/ring-refunds 
5. R Street Institute – Apple pulls end-to-end encryption feature from UK after demands for law enforcement access https://www.rstreet.org/commentary/apple-pulls-end-to-end-encryption-feature-from-uk-after-demands-for-law-enforcement-access/ 
6. Exposing the Secret Office 365 Forensics Tool – An ethical crisis in the digital forensics industry came to a head last week with the release of new details on Microsoft’s undocumented “Activities” API. https://www.lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>919</itunes:duration>
                <itunes:episode>61</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/5epjhf2hrty8qzze/audio_EP60_-_nancy_guthrie_v2bcufr-zvwpdg-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/tmjscej2qb8niqw9/audio_EP60_-_nancy_guthrie_v2bcufr-zvwpdg-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Ransomware Gangs Are Teaming Up</title>
        <itunes:title>Ransomware Gangs Are Teaming Up</itunes:title>
        <link>https://www.chatcyberside.com/e/ransomware-supergroups-inside-the-new-crime-ecosystem/</link>
                    <comments>https://www.chatcyberside.com/e/ransomware-supergroups-inside-the-new-crime-ecosystem/#comments</comments>        <pubDate>Tue, 10 Feb 2026 15:20:48 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/ec930c7c-d852-3446-860a-96287a901be8</guid>
                                    <description><![CDATA[<p>Ransomware gangs aren’t operating alone anymore and the lines between them are increasingly blurry.</p>
<p>In this episode of Cyberside Chats, we look at how modern ransomware groups collaborate, specialize, and team up to scale attacks faster. Using ShinyHunters’ newly launched data leak website as an example, we discuss how different crews handle access, social engineering, and data exposure, and why overlapping roles make attribution, defense, and response harder.</p>
<p>We also explore what this shift means for security leaders, from training and identity protection to preparing for data extortion that doesn’t involve encryption.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Harden identity and SaaS workflows, not just endpoints - Review help desk procedures, SSO flows, OAuth permissions, and admin access. Many recent incidents succeed without malware or exploits.</p>
<p>2. Train staff for voice phishing and IT impersonation - Add vishing scenarios to security awareness programs, especially for help desk and IT-adjacent roles.</p>
<p>3. Limit blast radius across cloud and SaaS platforms - Enforce least privilege, audit third-party integrations, and regularly review OAuth scopes and token lifetimes.</p>
<p>4. Plan for data extortion without ransomware - Update incident response plans and tabletop exercises to assume data theft and public exposure, even when no systems are encrypted.</p>
<p>5. Practice executive decision-making under data exposure pressure - Tabletop exercises should include legal, communications, and leadership discussions about public leaks, reputational risk, and extortion demands.</p>
<p> </p>
<p>Resources</p>
<p>1. Panera Bread Breach Linked to ShinyHunters and Voice Phishing</p>
<p><a href='https://mashable.com/article/panera-bread-breach-shinyhunters-voice-phishing-14-million-customers'>https://mashable.com/article/panera-bread-breach-shinyhunters-voice-phishing-14-million-customers </a></p>
<p>2. BreachForums Database Leak Exposes 324,000 Accounts</p>
<p><a href='https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/'>https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/ </a></p>
<p>3. BreachForums Disclosure and ShinyHunters</p>
<p><a href='https://blog.barracuda.com/2026/01/26/breachforums-disclosure-shinyhunters'>https://blog.barracuda.com/2026/01/26/breachforums-disclosure-shinyhunters </a></p>
<p>4. Scattered LAPSUS$ Hunters: 2025’s Most Dangerous Cybercrime</p>
<p><a href='https://www.picussecurity.com/resource/blog/scattered-lapsus-hunters-2025s-most-dangerous-cybercrime-supergroup'>https://www.picussecurity.com/resource/blog/scattered-lapsus-hunters-2025s-most-dangerous-cybercrime-supergroup </a></p>
<p>5. Microsoft Digital Defense Report</p>
<p><a href='https://www.microsoft.com/security/business/security-insider/microsoft-digital-defense-report'>https://www.microsoft.com/security/business/security-insider/microsoft-digital-defense-report</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ransomware gangs aren’t operating alone anymore and the lines between them are increasingly blurry.</p>
<p>In this episode of Cyberside Chats, we look at how modern ransomware groups collaborate, specialize, and team up to scale attacks faster. Using ShinyHunters’ newly launched data leak website as an example, we discuss how different crews handle access, social engineering, and data exposure, and why overlapping roles make attribution, defense, and response harder.</p>
<p>We also explore what this shift means for security leaders, from training and identity protection to preparing for data extortion that doesn’t involve encryption.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Harden identity and SaaS workflows, not just endpoints - Review help desk procedures, SSO flows, OAuth permissions, and admin access. Many recent incidents succeed without malware or exploits.</p>
<p>2. Train staff for voice phishing and IT impersonation - Add vishing scenarios to security awareness programs, especially for help desk and IT-adjacent roles.</p>
<p>3. Limit blast radius across cloud and SaaS platforms - Enforce least privilege, audit third-party integrations, and regularly review OAuth scopes and token lifetimes.</p>
<p>4. Plan for data extortion without ransomware - Update incident response plans and tabletop exercises to assume data theft and public exposure, even when no systems are encrypted.</p>
<p>5. Practice executive decision-making under data exposure pressure - Tabletop exercises should include legal, communications, and leadership discussions about public leaks, reputational risk, and extortion demands.</p>
<p> </p>
<p>Resources</p>
<p>1. Panera Bread Breach Linked to ShinyHunters and Voice Phishing</p>
<p><a href='https://mashable.com/article/panera-bread-breach-shinyhunters-voice-phishing-14-million-customers'>https://mashable.com/article/panera-bread-breach-shinyhunters-voice-phishing-14-million-customers </a></p>
<p>2. BreachForums Database Leak Exposes 324,000 Accounts</p>
<p><a href='https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/'>https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/ </a></p>
<p>3. BreachForums Disclosure and ShinyHunters</p>
<p><a href='https://blog.barracuda.com/2026/01/26/breachforums-disclosure-shinyhunters'>https://blog.barracuda.com/2026/01/26/breachforums-disclosure-shinyhunters </a></p>
<p>4. Scattered LAPSUS$ Hunters: 2025’s Most Dangerous Cybercrime</p>
<p><a href='https://www.picussecurity.com/resource/blog/scattered-lapsus-hunters-2025s-most-dangerous-cybercrime-supergroup'>https://www.picussecurity.com/resource/blog/scattered-lapsus-hunters-2025s-most-dangerous-cybercrime-supergroup </a></p>
<p>5. Microsoft Digital Defense Report</p>
<p><a href='https://www.microsoft.com/security/business/security-insider/microsoft-digital-defense-report'>https://www.microsoft.com/security/business/security-insider/microsoft-digital-defense-report</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ixpawhjg2qxndbnb/EP59_-_ransomware_criminals_audio_only71joj-hf7zvs-Optimized.mp3" length="15717547" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ransomware gangs aren’t operating alone anymore and the lines between them are increasingly blurry.
In this episode of Cyberside Chats, we look at how modern ransomware groups collaborate, specialize, and team up to scale attacks faster. Using ShinyHunters’ newly launched data leak website as an example, we discuss how different crews handle access, social engineering, and data exposure, and why overlapping roles make attribution, defense, and response harder.
We also explore what this shift means for security leaders, from training and identity protection to preparing for data extortion that doesn’t involve encryption.
 
Key Takeaways
1. Harden identity and SaaS workflows, not just endpoints - Review help desk procedures, SSO flows, OAuth permissions, and admin access. Many recent incidents succeed without malware or exploits.
2. Train staff for voice phishing and IT impersonation - Add vishing scenarios to security awareness programs, especially for help desk and IT-adjacent roles.
3. Limit blast radius across cloud and SaaS platforms - Enforce least privilege, audit third-party integrations, and regularly review OAuth scopes and token lifetimes.
4. Plan for data extortion without ransomware - Update incident response plans and tabletop exercises to assume data theft and public exposure, even when no systems are encrypted.
5. Practice executive decision-making under data exposure pressure - Tabletop exercises should include legal, communications, and leadership discussions about public leaks, reputational risk, and extortion demands.
 
Resources
1. Panera Bread Breach Linked to ShinyHunters and Voice Phishing
https://mashable.com/article/panera-bread-breach-shinyhunters-voice-phishing-14-million-customers 
2. BreachForums Database Leak Exposes 324,000 Accounts
https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/ 
3. BreachForums Disclosure and ShinyHunters
https://blog.barracuda.com/2026/01/26/breachforums-disclosure-shinyhunters 
4. Scattered LAPSUS$ Hunters: 2025’s Most Dangerous Cybercrime
https://www.picussecurity.com/resource/blog/scattered-lapsus-hunters-2025s-most-dangerous-cybercrime-supergroup 
5. Microsoft Digital Defense Report
https://www.microsoft.com/security/business/security-insider/microsoft-digital-defense-report
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>944</itunes:duration>
                <itunes:episode>60</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/fi8wv6hi5xk9tgt8/EP59_-_ransomware_criminals_audio_only71joj-hf7zvs-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/gvzgipv78ajcmd35/EP59_-_ransomware_criminals_audio_only71joj-hf7zvs-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Top Threat of 2026: The AI Visibility and Control Gap</title>
        <itunes:title>Top Threat of 2026: The AI Visibility and Control Gap</itunes:title>
        <link>https://www.chatcyberside.com/e/ai-unseen-the-hidden-risks-shaping-cybersecurity-in-2026/</link>
                    <comments>https://www.chatcyberside.com/e/ai-unseen-the-hidden-risks-shaping-cybersecurity-in-2026/#comments</comments>        <pubDate>Tue, 03 Feb 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/634c4ab1-9f07-3926-b944-54d0b8570d6b</guid>
                                    <description><![CDATA[<p>AI is no longer a standalone tool—it is embedded directly into productivity platforms, collaboration systems, analytics workflows, and customer-facing applications. In this special CyberSide Chats episode, Sherri Davidoff and Matt Durrin break down why lack of visibility and control over AI has emerged as the first and most pressing top threat of 2026.</p>
<p>Using real-world examples like the EchoLeak zero-click vulnerability in Microsoft 365 Copilot, the discussion highlights how AI can inherit broad, legitimate access to enterprise data while operating outside traditional security controls. These risks often generate no alerts, no indicators of compromise, and no obvious “incident” until sensitive data has already been exposed or misused.</p>
<p>Listeners will walk away with a practical framework for understanding where AI risk hides inside modern environments—and concrete steps security and IT teams can take to centralize AI usage, regain visibility, govern access, and apply long-standing security principles to this rapidly evolving attack surface.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Centralize AI usage across the organization. Require a clear, centralized process for approving AI tools and enabling new AI features, including those embedded in existing SaaS platforms.</p>
<p>2. Gain visibility into AI access and data flows. Inventory which AI tools, agents, and features are in use, which users interact with them, and what data sources they can access or influence.</p>
<p>3. Restrict and govern AI usage based on data sensitivity. Align AI permissions with data classification, restrict use for regulated or highly sensitive data sets, and integrate AI considerations into vendor risk management.</p>
<p>4. Apply the principle of least privilege to AI systems. Treat AI like any other privileged entity by limiting access to only what is necessary and reducing blast radius if credentials or models are misused.</p>
<p>5. Evaluate technical controls designed for AI security. Consider emerging solutions such as AI gateways that provide enforcement, logging, and observability for prompts, responses, and model access.</p>
<p> </p>
<p>Resources</p>
<p>1. Microsoft Digital Defense Report 2025</p>
<p><a href='https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025'>https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025 </a></p>
<p>2. NIST AI Risk Management Framework</p>
<p><a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework </a></p>
<p>3. Microsoft 365 Copilot Zero-Click AI Vulnerability (EchoLeak)</p>
<p><a href='https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/'>https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/ </a></p>
<p>4. Adapting to AI Risks: Essential Cybersecurity Program Updates.</p>
<p><a href='https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/'>https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/ </a></p>
<p>5. Microsoft on Agentic AI and Embedded Automation (2026)</p>
<p><a href='https://news.microsoft.com/source/2026/01/08/microsoft-propels-retail-forward-with-agentic-ai-capabilities-that-power-intelligent-automation-for-every-retail-function/'>https://news.microsoft.com/source/2026/01/08/microsoft-propels-retail-forward-with-agentic-ai-capabilities-that-power-intelligent-automation-for-every-retail-function/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI is no longer a standalone tool—it is embedded directly into productivity platforms, collaboration systems, analytics workflows, and customer-facing applications. In this special CyberSide Chats episode, Sherri Davidoff and Matt Durrin break down why lack of visibility and control over AI has emerged as the first and most pressing top threat of 2026.</p>
<p>Using real-world examples like the EchoLeak zero-click vulnerability in Microsoft 365 Copilot, the discussion highlights how AI can inherit broad, legitimate access to enterprise data while operating outside traditional security controls. These risks often generate no alerts, no indicators of compromise, and no obvious “incident” until sensitive data has already been exposed or misused.</p>
<p>Listeners will walk away with a practical framework for understanding where AI risk hides inside modern environments—and concrete steps security and IT teams can take to centralize AI usage, regain visibility, govern access, and apply long-standing security principles to this rapidly evolving attack surface.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Centralize AI usage across the organization. Require a clear, centralized process for approving AI tools and enabling new AI features, including those embedded in existing SaaS platforms.</p>
<p>2. Gain visibility into AI access and data flows. Inventory which AI tools, agents, and features are in use, which users interact with them, and what data sources they can access or influence.</p>
<p>3. Restrict and govern AI usage based on data sensitivity. Align AI permissions with data classification, restrict use for regulated or highly sensitive data sets, and integrate AI considerations into vendor risk management.</p>
<p>4. Apply the principle of least privilege to AI systems. Treat AI like any other privileged entity by limiting access to only what is necessary and reducing blast radius if credentials or models are misused.</p>
<p>5. Evaluate technical controls designed for AI security. Consider emerging solutions such as AI gateways that provide enforcement, logging, and observability for prompts, responses, and model access.</p>
<p> </p>
<p>Resources</p>
<p>1. Microsoft Digital Defense Report 2025</p>
<p><a href='https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025'>https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025 </a></p>
<p>2. NIST AI Risk Management Framework</p>
<p><a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework </a></p>
<p>3. Microsoft 365 Copilot Zero-Click AI Vulnerability (EchoLeak)</p>
<p><a href='https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/'>https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/ </a></p>
<p>4. Adapting to AI Risks: Essential Cybersecurity Program Updates.</p>
<p><a href='https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/'>https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/ </a></p>
<p>5. Microsoft on Agentic AI and Embedded Automation (2026)</p>
<p><a href='https://news.microsoft.com/source/2026/01/08/microsoft-propels-retail-forward-with-agentic-ai-capabilities-that-power-intelligent-automation-for-every-retail-function/'>https://news.microsoft.com/source/2026/01/08/microsoft-propels-retail-forward-with-agentic-ai-capabilities-that-power-intelligent-automation-for-every-retail-function/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2476798h3xwysj2x/ep58_-_security_threats_2026_Audio_-_v2aakbo-drsqk3-Optimized.mp3" length="18823276" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI is no longer a standalone tool—it is embedded directly into productivity platforms, collaboration systems, analytics workflows, and customer-facing applications. In this special CyberSide Chats episode, Sherri Davidoff and Matt Durrin break down why lack of visibility and control over AI has emerged as the first and most pressing top threat of 2026.
Using real-world examples like the EchoLeak zero-click vulnerability in Microsoft 365 Copilot, the discussion highlights how AI can inherit broad, legitimate access to enterprise data while operating outside traditional security controls. These risks often generate no alerts, no indicators of compromise, and no obvious “incident” until sensitive data has already been exposed or misused.
Listeners will walk away with a practical framework for understanding where AI risk hides inside modern environments—and concrete steps security and IT teams can take to centralize AI usage, regain visibility, govern access, and apply long-standing security principles to this rapidly evolving attack surface.
 
Key Takeaways
1. Centralize AI usage across the organization. Require a clear, centralized process for approving AI tools and enabling new AI features, including those embedded in existing SaaS platforms.
2. Gain visibility into AI access and data flows. Inventory which AI tools, agents, and features are in use, which users interact with them, and what data sources they can access or influence.
3. Restrict and govern AI usage based on data sensitivity. Align AI permissions with data classification, restrict use for regulated or highly sensitive data sets, and integrate AI considerations into vendor risk management.
4. Apply the principle of least privilege to AI systems. Treat AI like any other privileged entity by limiting access to only what is necessary and reducing blast radius if credentials or models are misused.
5. Evaluate technical controls designed for AI security. Consider emerging solutions such as AI gateways that provide enforcement, logging, and observability for prompts, responses, and model access.
 
Resources
1. Microsoft Digital Defense Report 2025
https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025 
2. NIST AI Risk Management Framework
https://www.nist.gov/itl/ai-risk-management-framework 
3. Microsoft 365 Copilot Zero-Click AI Vulnerability (EchoLeak)
https://www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/ 
4. Adapting to AI Risks: Essential Cybersecurity Program Updates.
https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/ 
5. Microsoft on Agentic AI and Embedded Automation (2026)
https://news.microsoft.com/source/2026/01/08/microsoft-propels-retail-forward-with-agentic-ai-capabilities-that-power-intelligent-automation-for-every-retail-function/]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1138</itunes:duration>
                <itunes:episode>59</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/f9gi6qdysfdz6ayw/ep58_-_security_threats_2026_Audio_-_v2aakbo-drsqk3-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/yyd49pj43mwmw3wx/ep58_-_security_threats_2026_Audio_-_v2aakbo-drsqk3-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Verizon Outage and the Cost of Concentration</title>
        <itunes:title>The Verizon Outage and the Cost of Concentration</itunes:title>
        <link>https://www.chatcyberside.com/e/when-a-software-glitch-silences-a-nation-inside-the-verizon-outage/</link>
                    <comments>https://www.chatcyberside.com/e/when-a-software-glitch-silences-a-nation-inside-the-verizon-outage/#comments</comments>        <pubDate>Tue, 27 Jan 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/a87a6b1e-55c3-31ae-884a-29e2f024b2f3</guid>
                                    <description><![CDATA[<p>The recent Verizon outage underscores a growing risk in today’s technology landscape: when critical services are concentrated among a small number of providers, failures don’t stay isolated.</p>
<p>In this live discussion, we’ll connect the Verizon outage to past telecom and cloud disruptions to examine how infrastructure dependency creates cascading business impact. We’ll also explore how large-scale outages intersect with security threats targeting telecommunications, where availability, confidentiality, and integrity failures increasingly overlap.</p>
<p>The session will close with actionable takeaways for strengthening resilience and risk planning across cybersecurity and IT programs.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Diversify your technology infrastructure. Relying on a single carrier, cloud provider, or bundled service creates a single point of failure. Purposeful diversification across providers can reduce the impact of large-scale outages and improve overall resilience.</p>
<p>2. Treat outages as security incidents, not just reliability problems. Large-scale telecom and cloud outages directly disrupt authentication, monitoring, and incident response, and should trigger security workflows—not just IT troubleshooting.</p>
<p>3. Identify and document your dependencies on carriers and cloud providers. Many security controls rely on SMS, voice, cloud identity, or single regions; understanding these dependencies ahead of time prevents dangerous blind spots during outages.</p>
<p>4. Plan and test incident response without phones, SMS, or primary cloud access. Assume your normal communication and authentication methods will fail and ensure your teams know how to coordinate securely when core services are unavailable.</p>
<p>5. Expect outages to increase fraud and social engineering activity. Attackers exploit confusion and urgency during service disruptions, so security teams should prepare staff for impersonation and “service restoration” scams during major outages.</p>
<p>6. Use widespread outages as learning opportunities. Review what happened, assess how your organization was—or could have been—impacted, identify potential areas for improvement, and update incident response, communications, and resilience plans accordingly.</p>
<p> </p>
<p>Resources</p>
<p>1. Verizon official network outage update <a href='https://www.verizon.com/about/news/update-network-outage'>https://www.verizon.com/about/news/update-network-outage </a></p>
<p>2. Forrester: Verizon outage reignites reliability concerns <a href='https://www.forrester.com/blogs/verizon-outage-reignites-reliability-concerns/'>https://www.forrester.com/blogs/verizon-outage-reignites-reliability-concerns/ </a></p>
<p>3. CNN: Verizon outage disrupted phone and internet service nationwide <a href='https://www.cnn.com/2026/01/15/tech/verizon-outage-phone-internet-service'>https://www.cnn.com/2026/01/15/tech/verizon-outage-phone-internet-service </a></p>
<p>4. AP News: Verizon outage disrupted calling and data services nationwide <a href='https://apnews.com/article/85d658a4fb6a6175cae8981d91a809c9'>https://apnews.com/article/85d658a4fb6a6175cae8981d91a809c9 </a></p>
<p>5. CNN: AT&amp;T outage shows how dependent daily life has become on mobile networks (2024) <a href='https://www.cnn.com/2024/02/23/tech/att-outage-customer-service'>https://www.cnn.com/2024/02/23/tech/att-outage-customer-service</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The recent Verizon outage underscores a growing risk in today’s technology landscape: when critical services are concentrated among a small number of providers, failures don’t stay isolated.</p>
<p>In this live discussion, we’ll connect the Verizon outage to past telecom and cloud disruptions to examine how infrastructure dependency creates cascading business impact. We’ll also explore how large-scale outages intersect with security threats targeting telecommunications, where availability, confidentiality, and integrity failures increasingly overlap.</p>
<p>The session will close with actionable takeaways for strengthening resilience and risk planning across cybersecurity and IT programs.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Diversify your technology infrastructure. Relying on a single carrier, cloud provider, or bundled service creates a single point of failure. Purposeful diversification across providers can reduce the impact of large-scale outages and improve overall resilience.</p>
<p>2. Treat outages as security incidents, not just reliability problems. Large-scale telecom and cloud outages directly disrupt authentication, monitoring, and incident response, and should trigger security workflows—not just IT troubleshooting.</p>
<p>3. Identify and document your dependencies on carriers and cloud providers. Many security controls rely on SMS, voice, cloud identity, or single regions; understanding these dependencies ahead of time prevents dangerous blind spots during outages.</p>
<p>4. Plan and test incident response without phones, SMS, or primary cloud access. Assume your normal communication and authentication methods will fail and ensure your teams know how to coordinate securely when core services are unavailable.</p>
<p>5. Expect outages to increase fraud and social engineering activity. Attackers exploit confusion and urgency during service disruptions, so security teams should prepare staff for impersonation and “service restoration” scams during major outages.</p>
<p>6. Use widespread outages as learning opportunities. Review what happened, assess how your organization was—or could have been—impacted, identify potential areas for improvement, and update incident response, communications, and resilience plans accordingly.</p>
<p> </p>
<p>Resources</p>
<p>1. Verizon official network outage update <a href='https://www.verizon.com/about/news/update-network-outage'>https://www.verizon.com/about/news/update-network-outage </a></p>
<p>2. Forrester: Verizon outage reignites reliability concerns <a href='https://www.forrester.com/blogs/verizon-outage-reignites-reliability-concerns/'>https://www.forrester.com/blogs/verizon-outage-reignites-reliability-concerns/ </a></p>
<p>3. CNN: Verizon outage disrupted phone and internet service nationwide <a href='https://www.cnn.com/2026/01/15/tech/verizon-outage-phone-internet-service'>https://www.cnn.com/2026/01/15/tech/verizon-outage-phone-internet-service </a></p>
<p>4. AP News: Verizon outage disrupted calling and data services nationwide <a href='https://apnews.com/article/85d658a4fb6a6175cae8981d91a809c9'>https://apnews.com/article/85d658a4fb6a6175cae8981d91a809c9 </a></p>
<p>5. CNN: AT&amp;T outage shows how dependent daily life has become on mobile networks (2024) <a href='https://www.cnn.com/2024/02/23/tech/att-outage-customer-service'>https://www.cnn.com/2024/02/23/tech/att-outage-customer-service</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/njmctaebzzyzcae7/EP57_full_v1_Audio6ncnc-dufa4g-Optimized.mp3" length="30127278" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The recent Verizon outage underscores a growing risk in today’s technology landscape: when critical services are concentrated among a small number of providers, failures don’t stay isolated.
In this live discussion, we’ll connect the Verizon outage to past telecom and cloud disruptions to examine how infrastructure dependency creates cascading business impact. We’ll also explore how large-scale outages intersect with security threats targeting telecommunications, where availability, confidentiality, and integrity failures increasingly overlap.
The session will close with actionable takeaways for strengthening resilience and risk planning across cybersecurity and IT programs.
 
Key Takeaways
1. Diversify your technology infrastructure. Relying on a single carrier, cloud provider, or bundled service creates a single point of failure. Purposeful diversification across providers can reduce the impact of large-scale outages and improve overall resilience.
2. Treat outages as security incidents, not just reliability problems. Large-scale telecom and cloud outages directly disrupt authentication, monitoring, and incident response, and should trigger security workflows—not just IT troubleshooting.
3. Identify and document your dependencies on carriers and cloud providers. Many security controls rely on SMS, voice, cloud identity, or single regions; understanding these dependencies ahead of time prevents dangerous blind spots during outages.
4. Plan and test incident response without phones, SMS, or primary cloud access. Assume your normal communication and authentication methods will fail and ensure your teams know how to coordinate securely when core services are unavailable.
5. Expect outages to increase fraud and social engineering activity. Attackers exploit confusion and urgency during service disruptions, so security teams should prepare staff for impersonation and “service restoration” scams during major outages.
6. Use widespread outages as learning opportunities. Review what happened, assess how your organization was—or could have been—impacted, identify potential areas for improvement, and update incident response, communications, and resilience plans accordingly.
 
Resources
1. Verizon official network outage update https://www.verizon.com/about/news/update-network-outage 
2. Forrester: Verizon outage reignites reliability concerns https://www.forrester.com/blogs/verizon-outage-reignites-reliability-concerns/ 
3. CNN: Verizon outage disrupted phone and internet service nationwide https://www.cnn.com/2026/01/15/tech/verizon-outage-phone-internet-service 
4. AP News: Verizon outage disrupted calling and data services nationwide https://apnews.com/article/85d658a4fb6a6175cae8981d91a809c9 
5. CNN: AT&amp;T outage shows how dependent daily life has become on mobile networks (2024) https://www.cnn.com/2024/02/23/tech/att-outage-customer-service
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1845</itunes:duration>
                <itunes:episode>57</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/jqyv32yit64wq572/EP57_full_v1_Audio6ncnc-dufa4g-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/rkbv84vdk6mp9hw8/EP57_full_v1_Audio6ncnc-dufa4g-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk</title>
        <itunes:title>Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk</itunes:title>
        <link>https://www.chatcyberside.com/e/gm-busted-your-car-was-secretly-spying-on-you/</link>
                    <comments>https://www.chatcyberside.com/e/gm-busted-your-car-was-secretly-spying-on-you/#comments</comments>        <pubDate>Tue, 20 Jan 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/d5bad281-2e2c-3511-a103-2c8507a743ea</guid>
                                    <description><![CDATA[<p>The FTC has issued an order against General Motors for collecting and selling drivers’ precise location and behavior data, gathered every few seconds and marketed as a safety feature. That data was sold into insurance ecosystems and used to influence pricing and coverage decisions — a clear reminder that how organizations collect, retain, and share data now carries direct security, regulatory, and financial risk. </p>
<p>
In this episode of Cyberside Chats, we explain why the GM case matters to CISOs, cybersecurity leaders, and IT teams everywhere. Data proliferation doesn’t just create privacy exposure; it creates systemic risk that fuels identity abuse, authentication bypass, fake job applications, and deepfake campaigns across organizations. The message is simple: data is hazardous material, and minimizing it is now a core part of cybersecurity strategy. </p>
<p>
Key Takeaways:</p>
<p>1. Prioritize data inventory and mapping in 2026 </p>
<p>You cannot assess risk, select controls, or meet regulatory obligations without knowing what data you have, where it lives, how it flows, and why it is retained. </p>
<p>2. Reduce data to reduce risk </p>
<p>Data minimization is a security control that lowers breach impact, compliance burden, and long-term cost. </p>
<p>3. Expect that regulators care about data use, not just breaches </p>
<p>Enforcement increasingly targets over-collection, secondary use, sharing, and retention even when no breach occurs. </p>
<p>4. Create and actively use a data classification policy </p>
<p>Classification drives retention, access controls, monitoring, and protection aligned to data value and regulatory exposure. </p>
<p>5. Design identity and recovery assuming personal data is already compromised </p>
<p>Build authentication and recovery flows that do not rely on the secrecy of SSNs, dates of birth, addresses, or other static personal data. </p>
<p>6. Train teams on data handling, not just security tools </p>
<p>Ensure engineers, IT staff, and business teams understand what data can be collected, how long it can be retained, where it may be stored, and how it can be shared. </p>
<p>
Resources:</p>
<p>1. California Privacy Protection Agency — Delete Request and Opt-Out Platform (DROP) </p>
<p><a href='https://privacy.ca.gov/drop/'>https://privacy.ca.gov/drop/</a> </p>
<p>2. FTC Press Release — FTC Takes Action Against General Motors for Sharing Drivers’ Precise Location and Driving Behavior Data </p>
<p><a href='https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data'>https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data</a> </p>
<p>3. California Delete Act (SB 362) — Overview </p>
<p><a href='https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362'>https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362</a> </p>
<p>4. Texas Attorney General — Data Privacy Enforcement Actions </p>
<p><a href='https://www.texasattorneygeneral.gov/news/releases'>https://www.texasattorneygeneral.gov/news/releases</a> </p>
<p>5. Data Breaches by Sherri Davidoff </p>
<p><a href='https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782'>https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The FTC has issued an order against General Motors for collecting and selling drivers’ precise location and behavior data, gathered every few seconds and marketed as a safety feature. That data was sold into insurance ecosystems and used to influence pricing and coverage decisions — a clear reminder that how organizations collect, retain, and share data now carries direct security, regulatory, and financial risk. </p>
<p><br>
In this episode of Cyberside Chats, we explain why the GM case matters to CISOs, cybersecurity leaders, and IT teams everywhere. Data proliferation doesn’t just create privacy exposure; it creates systemic risk that fuels identity abuse, authentication bypass, fake job applications, and deepfake campaigns across organizations. The message is simple: data is hazardous material, and minimizing it is now a core part of cybersecurity strategy. </p>
<p><br>
Key Takeaways:</p>
<p>1. Prioritize data inventory and mapping in 2026 </p>
<p>You cannot assess risk, select controls, or meet regulatory obligations without knowing what data you have, where it lives, how it flows, and why it is retained. </p>
<p>2. Reduce data to reduce risk </p>
<p>Data minimization is a security control that lowers breach impact, compliance burden, and long-term cost. </p>
<p>3. Expect that regulators care about data use, not just breaches </p>
<p>Enforcement increasingly targets over-collection, secondary use, sharing, and retention even when no breach occurs. </p>
<p>4. Create and actively use a data classification policy </p>
<p>Classification drives retention, access controls, monitoring, and protection aligned to data value and regulatory exposure. </p>
<p>5. Design identity and recovery assuming personal data is already compromised </p>
<p>Build authentication and recovery flows that do not rely on the secrecy of SSNs, dates of birth, addresses, or other static personal data. </p>
<p>6. Train teams on data handling, not just security tools </p>
<p>Ensure engineers, IT staff, and business teams understand what data can be collected, how long it can be retained, where it may be stored, and how it can be shared. </p>
<p><br>
Resources:</p>
<p>1. California Privacy Protection Agency — Delete Request and Opt-Out Platform (DROP) </p>
<p><a href='https://privacy.ca.gov/drop/'>https://privacy.ca.gov/drop/</a> </p>
<p>2. FTC Press Release — <em>FTC Takes Action Against General Motors for Sharing Drivers’ Precise Location and Driving Behavior Data</em> </p>
<p><a href='https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data'>https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data</a> </p>
<p>3. California Delete Act (SB 362) — Overview </p>
<p><a href='https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362'>https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362</a> </p>
<p>4. Texas Attorney General — Data Privacy Enforcement Actions </p>
<p><a href='https://www.texasattorneygeneral.gov/news/releases'>https://www.texasattorneygeneral.gov/news/releases</a> </p>
<p><em>5. Data Breaches</em> by Sherri Davidoff </p>
<p><a href='https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782'>https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uhyje7w84ru6358z/EP56_Audio_onlyatf8h-26efcy-Optimized.mp3" length="19247409" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The FTC has issued an order against General Motors for collecting and selling drivers’ precise location and behavior data, gathered every few seconds and marketed as a safety feature. That data was sold into insurance ecosystems and used to influence pricing and coverage decisions — a clear reminder that how organizations collect, retain, and share data now carries direct security, regulatory, and financial risk. 
In this episode of Cyberside Chats, we explain why the GM case matters to CISOs, cybersecurity leaders, and IT teams everywhere. Data proliferation doesn’t just create privacy exposure; it creates systemic risk that fuels identity abuse, authentication bypass, fake job applications, and deepfake campaigns across organizations. The message is simple: data is hazardous material, and minimizing it is now a core part of cybersecurity strategy. 
Key Takeaways:
1. Prioritize data inventory and mapping in 2026 
You cannot assess risk, select controls, or meet regulatory obligations without knowing what data you have, where it lives, how it flows, and why it is retained. 
2. Reduce data to reduce risk 
Data minimization is a security control that lowers breach impact, compliance burden, and long-term cost. 
3. Expect that regulators care about data use, not just breaches 
Enforcement increasingly targets over-collection, secondary use, sharing, and retention even when no breach occurs. 
4. Create and actively use a data classification policy 
Classification drives retention, access controls, monitoring, and protection aligned to data value and regulatory exposure. 
5. Design identity and recovery assuming personal data is already compromised 
Build authentication and recovery flows that do not rely on the secrecy of SSNs, dates of birth, addresses, or other static personal data. 
6. Train teams on data handling, not just security tools 
Ensure engineers, IT staff, and business teams understand what data can be collected, how long it can be retained, where it may be stored, and how it can be shared. 
Resources:
1. California Privacy Protection Agency — Delete Request and Opt-Out Platform (DROP) 
https://privacy.ca.gov/drop/ 
2. FTC Press Release — FTC Takes Action Against General Motors for Sharing Drivers’ Precise Location and Driving Behavior Data 
https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-takes-action-against-general-motors-sharing-drivers-precise-location-driving-behavior-data 
3. California Delete Act (SB 362) — Overview 
https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362 
4. Texas Attorney General — Data Privacy Enforcement Actions 
https://www.texasattorneygeneral.gov/news/releases 
5. Data Breaches by Sherri Davidoff 
https://www.amazon.com/Data-Breaches-Opportunity-Sherri-Davidoff/dp/0134506782]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1165</itunes:duration>
                <itunes:episode>56</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/vd8c6frcwiwnj2a2/EP56_Audio_onlyatf8h-26efcy-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/pt58e8xrkefgx37k/EP56_Audio_onlyatf8h-26efcy-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Venezuela’s Blackout: Cybercrime Domino Effect</title>
        <itunes:title>Venezuela’s Blackout: Cybercrime Domino Effect</itunes:title>
        <link>https://www.chatcyberside.com/e/lights-out-in-caracas-cyberattack-or-kinetic-strike/</link>
                    <comments>https://www.chatcyberside.com/e/lights-out-in-caracas-cyberattack-or-kinetic-strike/#comments</comments>        <pubDate>Tue, 13 Jan 2026 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/dfa015f7-5671-3f2d-bea7-2856c41dfe5b</guid>
                                    <description><![CDATA[<p>When Venezuela experienced widespread power and internet outages, the impact went far beyond inconvenience—it created a perfect environment for cyber exploitation. </p>
<p>In this episode of Cyberside Chats, we use Venezuela’s disruption as a case study to show how cyber risk escalates when power, connectivity, and trusted services break down. We examine why phishing, fraud, and impersonation reliably surge after crises, how narratives around cyber-enabled disruption can trigger copycat or opportunistic attacks, and why even well-run organizations resort to risky security shortcuts when normal systems fail. </p>
<p>We also explore how attackers weaponize emergency messaging, impersonate critical infrastructure and connectivity providers, and exploit verification failures when standard workflows are disrupted. The takeaway is simple: when infrastructure collapses, trust erodes—and cybercrime scales quickly to fill the gap. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When Venezuela experienced widespread power and internet outages, the impact went far beyond inconvenience—it created a perfect environment for cyber exploitation. </p>
<p>In this episode of Cyberside Chats, we use Venezuela’s disruption as a case study to show how cyber risk escalates when power, connectivity, and trusted services break down. We examine why phishing, fraud, and impersonation reliably surge after crises, how narratives around cyber-enabled disruption can trigger copycat or opportunistic attacks, and why even well-run organizations resort to risky security shortcuts when normal systems fail. </p>
<p>We also explore how attackers weaponize emergency messaging, impersonate critical infrastructure and connectivity providers, and exploit verification failures when standard workflows are disrupted. The takeaway is simple: when infrastructure collapses, trust erodes—and cybercrime scales quickly to fill the gap. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i5xfatkgcqtkpzra/EP55_Audio_Only6cwop-qyutw9-Optimized.mp3" length="13767496" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When Venezuela experienced widespread power and internet outages, the impact went far beyond inconvenience—it created a perfect environment for cyber exploitation. 
In this episode of Cyberside Chats, we use Venezuela’s disruption as a case study to show how cyber risk escalates when power, connectivity, and trusted services break down. We examine why phishing, fraud, and impersonation reliably surge after crises, how narratives around cyber-enabled disruption can trigger copycat or opportunistic attacks, and why even well-run organizations resort to risky security shortcuts when normal systems fail. 
We also explore how attackers weaponize emergency messaging, impersonate critical infrastructure and connectivity providers, and exploit verification failures when standard workflows are disrupted. The takeaway is simple: when infrastructure collapses, trust erodes—and cybercrime scales quickly to fill the gap. ]]></itunes:summary>
        <itunes:author>Cyberside Chats</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>822</itunes:duration>
                <itunes:episode>55</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/t9qxzaprrth2dwma/EP55_Audio_Only6cwop-qyutw9-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/2c5rh8vt9np5w4t7/EP55_Audio_Only6cwop-qyutw9-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>What the Epstein Files Teach Us About Redaction and AI</title>
        <itunes:title>What the Epstein Files Teach Us About Redaction and AI</itunes:title>
        <link>https://www.chatcyberside.com/e/what-the-epstein-files-teach-us-about-redaction-and-ai/</link>
                    <comments>https://www.chatcyberside.com/e/what-the-epstein-files-teach-us-about-redaction-and-ai/#comments</comments>        <pubDate>Tue, 06 Jan 2026 06:26:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/aae0aaa1-ce6d-30a4-9b98-34fd941de83c</guid>
                                    <description><![CDATA[<p>The December release of the Epstein files wasn’t just controversial—it exposed a set of security problems organizations face every day. Documents that appeared heavily redacted weren’t always properly sanitized. Some files were pulled and reissued, drawing even more attention. And as interest surged, attackers quickly stepped in, distributing malware and phishing sites disguised as “Epstein archives.” </p>
<p>
In this episode of Cyberside Chats, we use the Epstein files as a real-world case study to explore two sides of the same problem: how organizations can be confident they’re not releasing more data than intended, and how they can trust—or verify—the information they consume under pressure. We dig into redaction failures, how AI tools change the risk model, how attackers weaponize breaking news, and practical ways teams can authenticate data before reacting.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The December release of the Epstein files wasn’t just controversial—it exposed a set of security problems organizations face every day. Documents that appeared heavily redacted weren’t always properly sanitized. Some files were pulled and reissued, drawing even more attention. And as interest surged, attackers quickly stepped in, distributing malware and phishing sites disguised as “Epstein archives.” </p>
<p><br>
In this episode of Cyberside Chats, we use the Epstein files as a real-world case study to explore two sides of the same problem: how organizations can be confident they’re not releasing more data than intended, and how they can trust—or verify—the information they consume under pressure. We dig into redaction failures, how AI tools change the risk model, how attackers weaponize breaking news, and practical ways teams can authenticate data before reacting.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ykk5rkau7h9c6csa/EP54_audio_v18kz4c-sydwba-Optimized.mp3" length="15459711" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The December release of the Epstein files wasn’t just controversial—it exposed a set of security problems organizations face every day. Documents that appeared heavily redacted weren’t always properly sanitized. Some files were pulled and reissued, drawing even more attention. And as interest surged, attackers quickly stepped in, distributing malware and phishing sites disguised as “Epstein archives.” 
In this episode of Cyberside Chats, we use the Epstein files as a real-world case study to explore two sides of the same problem: how organizations can be confident they’re not releasing more data than intended, and how they can trust—or verify—the information they consume under pressure. We dig into redaction failures, how AI tools change the risk model, how attackers weaponize breaking news, and practical ways teams can authenticate data before reacting.]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>928</itunes:duration>
                <itunes:episode>54</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/nqxmtassjuw4u55z/EP54_audio_v18kz4c-sydwba-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/3ajdqvptb4m4y9v6/EP54_audio_v18kz4c-sydwba-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Amazon's Warning: The New Reality of Initial Access</title>
        <itunes:title>Amazon's Warning: The New Reality of Initial Access</itunes:title>
        <link>https://www.chatcyberside.com/e/amazon-s-deepfake-hire-and-a-5-year-espionage-campaign-what-happened/</link>
                    <comments>https://www.chatcyberside.com/e/amazon-s-deepfake-hire-and-a-5-year-espionage-campaign-what-happened/#comments</comments>        <pubDate>Tue, 30 Dec 2025 06:33:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/1e91b1da-fa9b-3f4a-b694-9a9dfd6b1d33</guid>
                                    <description><![CDATA[<p>Amazon released two security disclosures in the same week — and together, they reveal how modern attackers are getting inside organizations without breaking in.</p>
<p>One case involved a North Korean IT worker who entered Amazon’s environment through a third-party contractor and was detected through subtle behavioral anomalies rather than malware. The other detailed a years-long Russian state-sponsored campaign that shifted away from exploits and instead abused misconfigured edge devices and trusted infrastructure to steal and replay credentials.</p>
<p>Together, these incidents show how nation-state attackers are increasingly blending into human and technical systems that organizations already trust — forcing defenders to rethink how initial access really happens going into 2026.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Treat hiring and contractors as part of your attack surface. </p>
<p>Nation-state actors are deliberately targeting IT and technical roles. Contractor onboarding, identity verification, and access scoping should be handled with the same rigor as privileged account provisioning.</p>
<p>2. Secure and monitor network edge devices as identity infrastructure </p>
<p>Misconfigured edge devices have become a primary initial access vector. Inventory them, assign ownership, restrict management access, and monitor them like authentication systems — not just networking gear.</p>
<p>3. Enforce strong MFA everywhere credentials matter </p>
<p>If credentials can be used without MFA, assume they will be abused. Require MFA on VPNs, edge device management interfaces, cloud consoles, SaaS admin portals, and internal administrative access.</p>
<p>4. Harden endpoints and validate how access actually occurs </p>
<p>Endpoint security still matters. Harden devices and look for signs of remote control, unusual latency, or access paths that don’t match how work is normally done.</p>
<p>5. Shift detection from “malicious” to “out of place” </p>
<p>The most effective attacks often look legitimate. Focus detection on behavioral mismatches — access that technically succeeds but doesn’t align with role, geography, timing, or expected workflow.</p>
<p> </p>
<p>Resources:</p>
<p>1. Amazon Threat Intelligence Identifies Russian Cyber Threat Group Targeting Western Critical Infrastructure</p>
<p><a href='https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/'>https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/ </a></p>
<p>2. Amazon Caught North Korean IT Worker by Tracing Keystroke Data</p>
<p><a href='https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-%20korean-it-worker-by-tracing-keystroke-data/'>https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data/</a></p>
<p>3. North Korean Infiltrator Caught Working in Amazon IT Department Thanks to Keystroke Lag</p>
<p><a href='https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location'>https://www.tomshardware.com/tech-industry/cyber-security/north-korean- infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms- keystroke-input-raises-red-flags-over-true-location </a></p>
<p>4. Confessions of a Laptop Farmer: How an American Helped North Korea’s Remote Worker Scheme</p>
<p><a href='https://www.bloomberg.com/news/articles/2023-08-23/confessions-of-a-laptop-farmer-how-an-american-helped-north-korea-s-remote-worker-scheme'>https://www.bloomberg.com/news/articles/2023-08-23/confessions-of-a-laptop- farmer-how-an-american-helped-north-korea-s-remote-worker-scheme</a></p>
<p>5. Hiring security checklist</p>
<p><a href='https://www.lmgsecurity.com/resources/hiring-security-checklist/'>https://www.lmgsecurity.com/resources/hiring-security-checklist/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Amazon released two security disclosures in the same week — and together, they reveal how modern attackers are getting inside organizations without breaking in.</p>
<p>One case involved a North Korean IT worker who entered Amazon’s environment through a third-party contractor and was detected through subtle behavioral anomalies rather than malware. The other detailed a years-long Russian state-sponsored campaign that shifted away from exploits and instead abused misconfigured edge devices and trusted infrastructure to steal and replay credentials.</p>
<p>Together, these incidents show how nation-state attackers are increasingly blending into human and technical systems that organizations already trust — forcing defenders to rethink how initial access really happens going into 2026.</p>
<p> </p>
<p>Key Takeaways</p>
<p>1. Treat hiring and contractors as part of your attack surface. </p>
<p>Nation-state actors are deliberately targeting IT and technical roles. Contractor onboarding, identity verification, and access scoping should be handled with the same rigor as privileged account provisioning.</p>
<p>2. Secure and monitor network edge devices as identity infrastructure </p>
<p>Misconfigured edge devices have become a primary initial access vector. Inventory them, assign ownership, restrict management access, and monitor them like authentication systems — not just networking gear.</p>
<p>3. Enforce strong MFA everywhere credentials matter </p>
<p>If credentials can be used without MFA, assume they will be abused. Require MFA on VPNs, edge device management interfaces, cloud consoles, SaaS admin portals, and internal administrative access.</p>
<p>4. Harden endpoints and validate how access actually occurs </p>
<p>Endpoint security still matters. Harden devices and look for signs of remote control, unusual latency, or access paths that don’t match how work is normally done.</p>
<p>5. Shift detection from “malicious” to “out of place” </p>
<p>The most effective attacks often look legitimate. Focus detection on behavioral mismatches — access that technically succeeds but doesn’t align with role, geography, timing, or expected workflow.</p>
<p> </p>
<p>Resources:</p>
<p>1. Amazon Threat Intelligence Identifies Russian Cyber Threat Group Targeting Western Critical Infrastructure</p>
<p><a href='https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/'>https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/ </a></p>
<p>2. Amazon Caught North Korean IT Worker by Tracing Keystroke Data</p>
<p><a href='https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-%20korean-it-worker-by-tracing-keystroke-data/'>https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data/</a></p>
<p>3. North Korean Infiltrator Caught Working in Amazon IT Department Thanks to Keystroke Lag</p>
<p><a href='https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location'>https://www.tomshardware.com/tech-industry/cyber-security/north-korean- infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms- keystroke-input-raises-red-flags-over-true-location </a></p>
<p>4. Confessions of a Laptop Farmer: How an American Helped North Korea’s Remote Worker Scheme</p>
<p><a href='https://www.bloomberg.com/news/articles/2023-08-23/confessions-of-a-laptop-farmer-how-an-american-helped-north-korea-s-remote-worker-scheme'>https://www.bloomberg.com/news/articles/2023-08-23/confessions-of-a-laptop- farmer-how-an-american-helped-north-korea-s-remote-worker-scheme</a></p>
<p>5. Hiring security checklist</p>
<p><a href='https://www.lmgsecurity.com/resources/hiring-security-checklist/'>https://www.lmgsecurity.com/resources/hiring-security-checklist/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/iej7fvuk8iwv672u/riverside_audio_-_amazons_warning_-_cyberside_chats_v3_lmg_security8urzs-vucct8-Optimized.mp3" length="15884221" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Amazon released two security disclosures in the same week — and together, they reveal how modern attackers are getting inside organizations without breaking in.
One case involved a North Korean IT worker who entered Amazon’s environment through a third-party contractor and was detected through subtle behavioral anomalies rather than malware. The other detailed a years-long Russian state-sponsored campaign that shifted away from exploits and instead abused misconfigured edge devices and trusted infrastructure to steal and replay credentials.
Together, these incidents show how nation-state attackers are increasingly blending into human and technical systems that organizations already trust — forcing defenders to rethink how initial access really happens going into 2026.
 
Key Takeaways
1. Treat hiring and contractors as part of your attack surface. 
Nation-state actors are deliberately targeting IT and technical roles. Contractor onboarding, identity verification, and access scoping should be handled with the same rigor as privileged account provisioning.
2. Secure and monitor network edge devices as identity infrastructure 
Misconfigured edge devices have become a primary initial access vector. Inventory them, assign ownership, restrict management access, and monitor them like authentication systems — not just networking gear.
3. Enforce strong MFA everywhere credentials matter 
If credentials can be used without MFA, assume they will be abused. Require MFA on VPNs, edge device management interfaces, cloud consoles, SaaS admin portals, and internal administrative access.
4. Harden endpoints and validate how access actually occurs 
Endpoint security still matters. Harden devices and look for signs of remote control, unusual latency, or access paths that don’t match how work is normally done.
5. Shift detection from “malicious” to “out of place” 
The most effective attacks often look legitimate. Focus detection on behavioral mismatches — access that technically succeeds but doesn’t align with role, geography, timing, or expected workflow.
 
Resources:
1. Amazon Threat Intelligence Identifies Russian Cyber Threat Group Targeting Western Critical Infrastructure
https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/ 
2. Amazon Caught North Korean IT Worker by Tracing Keystroke Data
https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data/
3. North Korean Infiltrator Caught Working in Amazon IT Department Thanks to Keystroke Lag
https://www.tomshardware.com/tech-industry/cyber-security/north-korean- infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms- keystroke-input-raises-red-flags-over-true-location 
4. Confessions of a Laptop Farmer: How an American Helped North Korea’s Remote Worker Scheme
https://www.bloomberg.com/news/articles/2023-08-23/confessions-of-a-laptop- farmer-how-an-american-helped-north-korea-s-remote-worker-scheme
5. Hiring security checklist
https://www.lmgsecurity.com/resources/hiring-security-checklist/]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>955</itunes:duration>
                <itunes:episode>53</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/55ygeap2f2udgsve/riverside_audio_-_amazons_warning_-_cyberside_chats_v3_lmg_security8urzs-vucct8-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/h8fad4jv8vizd73p/riverside_audio_-_amazons_warning_-_cyberside_chats_v3_lmg_security8urzs-vucct8-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>AI Broke Trust: Identity Has to Step Up in 2026</title>
        <itunes:title>AI Broke Trust: Identity Has to Step Up in 2026</itunes:title>
        <link>https://www.chatcyberside.com/e/when-ai-steals-trust-deepfakes-phishing-and-the-new-identity-crisis/</link>
                    <comments>https://www.chatcyberside.com/e/when-ai-steals-trust-deepfakes-phishing-and-the-new-identity-crisis/#comments</comments>        <pubDate>Tue, 23 Dec 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/16ab8767-dfe1-3c1b-8675-1e651c258381</guid>
                                    <description><![CDATA[<p>AI has supercharged phishing, deepfakes, and impersonation attacks—and 2025 proved that our trust systems aren’t built for this new reality. In this episode, Sherri and Matt break down the #1 change every security program needs in 2026: dramatically improving identity and authentication across the organization. </p>
<p>We explore how AI blurred the lines between legitimate and malicious communication, why authentication can no longer stop at the login screen, and where organizations must start adding verification into everyday workflows—from IT support calls to executive requests and financial approvals.  </p>
<p>Plus, we discuss what “next-generation” user training looks like when employees can no longer rely on old phishing cues and must instead adopt identity-safety habits that AI can’t easily spoof.  </p>
<p>If you want to strengthen your security program for the year ahead, this is the episode to watch.  </p>
<p>Key Takeaways: </p>
<ol>
<li>Audit where internal conversations trigger action. Before adding controls, understand where trust actually matters—financial approvals, IT support, HR changes, executive requests—and treat those points as attack surfaces.  </li>
<li>Expand authentication into everyday workflows. Add verification to calls, video meetings, chats, approvals, and support interactions using known systems, codes, and out-of-band confirmation. Apply friction intentionally where mistakes are costly.  </li>
<li>Use verified communication features in collaboration platforms. Enable identity indicators, reporting features, and access restrictions in tools like Teams and Slack, and treat them as identity systems rather than just chat tools.  </li>
<li>Implement out-of-band push confirmation for high-risk requests. Authenticator-based confirmation defeats voice, video, and message impersonation because attackers rarely control multiple channels simultaneously.  </li>
<li>Move toward continuous identity validation. Identity should be reassessed as behavior and risk change, with step-up verification and session revocation for high-risk actions.  </li>
<li>Redesign training around identity safety. Teach employees how to verify people and requests, not just emails, and reward them for slowing down and confirming—even when it frustrates leadership.  </li>
</ol>
<p> Tune in weekly on Tuesdays at 6:30 am ET for more cybersecurity advice, and visit <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> if you need help with cybersecurity testing, advisory services, or training. </p>
<p>Resources: </p>
<p>CFO.com – Deepfake CFO Scam Costs Engineering Firm $25 Million 
<a href='https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/'>https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/</a> </p>
<p>Retool – MFA Isn’t MFA 
<a href='https://retool.com/blog/mfa-isnt-mfa'>https://retool.com/blog/mfa-isnt-mfa</a> </p>
<p>Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” 
<a href='https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/'>https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/</a> </p>
<p>Wired – Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data 
<a href='https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/'>https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/</a> </p>
<p>LMG Security – 5 New-ish Microsoft Security Features &amp; What They Reveal About Today’s Threats 
<a href='https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/'>https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/</a> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI has supercharged phishing, deepfakes, and impersonation attacks—and 2025 proved that our trust systems aren’t built for this new reality. In this episode, Sherri and Matt break down the #1 change every security program needs in 2026: dramatically improving identity and authentication across the organization. </p>
<p>We explore how AI blurred the lines between legitimate and malicious communication, why authentication can no longer stop at the login screen, and where organizations must start adding verification into everyday workflows—from IT support calls to executive requests and financial approvals.  </p>
<p>Plus, we discuss what “next-generation” user training looks like when employees can no longer rely on old phishing cues and must instead adopt identity-safety habits that AI can’t easily spoof.  </p>
<p>If you want to strengthen your security program for the year ahead, this is the episode to watch.  </p>
<p>Key Takeaways: </p>
<ol>
<li>Audit where internal conversations trigger action. Before adding controls, understand where trust actually matters—financial approvals, IT support, HR changes, executive requests—and treat those points as attack surfaces.  </li>
<li>Expand authentication into everyday workflows. Add verification to calls, video meetings, chats, approvals, and support interactions using known systems, codes, and out-of-band confirmation. Apply friction intentionally where mistakes are costly.  </li>
<li>Use verified communication features in collaboration platforms. Enable identity indicators, reporting features, and access restrictions in tools like Teams and Slack, and treat them as identity systems rather than just chat tools.  </li>
<li>Implement out-of-band push confirmation for high-risk requests. Authenticator-based confirmation defeats voice, video, and message impersonation because attackers rarely control multiple channels simultaneously.  </li>
<li>Move toward continuous identity validation. Identity should be reassessed as behavior and risk change, with step-up verification and session revocation for high-risk actions.  </li>
<li>Redesign training around identity safety. Teach employees how to verify people and requests, not just emails, and reward them for slowing down and confirming—even when it frustrates leadership.  </li>
</ol>
<p> Tune in weekly on Tuesdays at 6:30 am ET for more cybersecurity advice, and visit <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> if you need help with cybersecurity testing, advisory services, or training. </p>
<p>Resources: </p>
<p>CFO.com – Deepfake CFO Scam Costs Engineering Firm $25 Million <br>
<a href='https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/'>https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/</a> </p>
<p>Retool – MFA Isn’t MFA <br>
<a href='https://retool.com/blog/mfa-isnt-mfa'>https://retool.com/blog/mfa-isnt-mfa</a> </p>
<p>Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” <br>
<a href='https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/'>https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/</a> </p>
<p>Wired – Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data <br>
<a href='https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/'>https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/</a> </p>
<p>LMG Security – 5 New-ish Microsoft Security Features &amp; What They Reveal About Today’s Threats <br>
<a href='https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/'>https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/</a> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pwthn7wi426fc63v/CSChats_527eht2-d64nam-Optimized.mp3" length="34729217" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI has supercharged phishing, deepfakes, and impersonation attacks—and 2025 proved that our trust systems aren’t built for this new reality. In this episode, Sherri and Matt break down the #1 change every security program needs in 2026: dramatically improving identity and authentication across the organization. 
We explore how AI blurred the lines between legitimate and malicious communication, why authentication can no longer stop at the login screen, and where organizations must start adding verification into everyday workflows—from IT support calls to executive requests and financial approvals.  
Plus, we discuss what “next-generation” user training looks like when employees can no longer rely on old phishing cues and must instead adopt identity-safety habits that AI can’t easily spoof.  
If you want to strengthen your security program for the year ahead, this is the episode to watch.  
Key Takeaways: 

Audit where internal conversations trigger action. Before adding controls, understand where trust actually matters—financial approvals, IT support, HR changes, executive requests—and treat those points as attack surfaces.  
Expand authentication into everyday workflows. Add verification to calls, video meetings, chats, approvals, and support interactions using known systems, codes, and out-of-band confirmation. Apply friction intentionally where mistakes are costly.  
Use verified communication features in collaboration platforms. Enable identity indicators, reporting features, and access restrictions in tools like Teams and Slack, and treat them as identity systems rather than just chat tools.  
Implement out-of-band push confirmation for high-risk requests. Authenticator-based confirmation defeats voice, video, and message impersonation because attackers rarely control multiple channels simultaneously.  
Move toward continuous identity validation. Identity should be reassessed as behavior and risk change, with step-up verification and session revocation for high-risk actions.  
Redesign training around identity safety. Teach employees how to verify people and requests, not just emails, and reward them for slowing down and confirming—even when it frustrates leadership.  

 Tune in weekly on Tuesdays at 6:30 am ET for more cybersecurity advice, and visit www.LMGsecurity.com if you need help with cybersecurity testing, advisory services, or training. 
Resources: 
CFO.com – Deepfake CFO Scam Costs Engineering Firm $25 Million https://www.cfo.com/news/deepfake-cfo-hong-kong-25-million-fraud-cyber-crime/ 
Retool – MFA Isn’t MFA https://retool.com/blog/mfa-isnt-mfa 
Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” https://news.sophos.com/en-us/2025/01/21/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/ 
Wired – Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/ 
LMG Security – 5 New-ish Microsoft Security Features &amp; What They Reveal About Today’s Threats https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/ 
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1964</itunes:duration>
                <itunes:episode>51</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/rsnf9xt8t9ttphkt/CSChats_527eht2-d64nam-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/b8xfsv33ryx8kej2/CSChats_527eht2-d64nam-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The 5 New-ish Microsoft Security Features to Roll Out in 2026</title>
        <itunes:title>The 5 New-ish Microsoft Security Features to Roll Out in 2026</itunes:title>
        <link>https://www.chatcyberside.com/e/collaboration-under-siege-microsoft-s-teams-security-overhaul/</link>
                    <comments>https://www.chatcyberside.com/e/collaboration-under-siege-microsoft-s-teams-security-overhaul/#comments</comments>        <pubDate>Tue, 16 Dec 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/1f0b2cb1-1287-31cb-ab19-ecf1c3a8b6d9</guid>
                                    <description><![CDATA[<p>Microsoft is rolling out a series of new-ish security features across Microsoft 365 in 2026 — and these updates are no accident. They’re direct responses to how attackers are exploiting collaboration tools like Teams, Slack, Zoom, and Google Chat. In this episode, Sherri and Matt break down the five features that matter most, why they’re happening now, and how every organization can benefit from these lessons, even if you’re not a Microsoft shop. </p>
<p>We explore the rise of impersonation attacks inside collaboration platforms, the security implications of AI copilots like Microsoft Copilot and Gemini, and why identity boundaries and data governance are quickly becoming foundational to modern security programs. You’ll come away with a clear understanding of what these new-ish Microsoft features signal about the evolving threat landscape — and practical steps you can take today to strengthen your security posture. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Treat collaboration platforms as high-risk communication channels. Attackers increasingly use Teams, Slack, Zoom, and similar tools to impersonate coworkers or support staff, and organizations should help employees verify unexpected contacts just as rigorously as they verify email. </li>
<li>Make it easy for users to report suspicious activity. Whether or not your platform offers a built-in reporting feature like Microsoft’s suspicious-call button, employees need a simple, well-understood way to escalate strange messages or calls inside collaboration tools. </li>
<li>Monitor external collaboration for anomalies. Microsoft’s new anomaly report highlights a growing need across all ecosystems to watch for unexpected domains, unusual activity patterns, and impersonation attempts that occur through external collaboration channels. </li>
<li>Classify and label sensitive data before enabling AI assistants. AI tools such as Copilot, Gemini, and Slack GPT inherit user permissions and may access far more information than intended if organizations haven’t established clear sensitivity labels and access boundaries. </li>
<li>Enforce identity and tenant boundaries to limit data leakage. Features like Tenant Restrictions v2 demonstrate the importance of restricting where users can authenticate and ensuring that corporate data stays within approved environments. </li>
<li>Update security training to reflect collaboration-era social engineering. Modern attacks frequently occur through chat messages, impersonated vendor accounts, malicious external domains, or voice/video calls, and training must evolve beyond traditional email-focused programs. </li>
</ol>
<p>Please follow our podcast for the latest cybersecurity advice, and visit us at <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> if you need help with technical testing, cybersecurity consulting, and training!</p>
<p>Resources Mentioned </p>
<ul>
<li>Microsoft 365: Advancing Microsoft 365 – New Capabilities and Pricing Update: <a href='https://www.microsoft.com/en-us/microsoft-365/blog/2025/12/04/advancing-microsoft-365-new-capabilities-and-pricing-update/'>https://www.microsoft.com/en-us/microsoft-365/blog/2025/12/04/advancing-microsoft-365-new-capabilities-and-pricing-update/</a> </li>
</ul>
<ul>
<li>Microsoft 365 Roadmap – Suspicious Call Reporting (ID 536573): <a href='https://www.microsoft.com/en-us/microsoft-365/roadmap?id=536573'>https://www.microsoft.com/en-us/microsoft-365/roadmap?id=536573</a> </li>
</ul>
<ul>
<li>Check Point Research: Exploiting Trust in Microsoft Teams: <a href='https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/'>https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/</a> </li>
<li>Phishing Susceptibility Study (arXiv):  <a href='https://arxiv.org/abs/2510.27298'>https://arxiv.org/abs/2510.27298</a> 
</li>
<li>LMG Security Video: Email Bombing &amp; IT Helpdesk Spoofing Attacks—How to Stop Them: <a href='https://www.lmgsecurity.com/videos/email-bombing-it-helpdesk-spoofing-attacks-how-to-stop-them/'>https://www.lmgsecurity.com/videos/email-bombing-it-helpdesk-spoofing-attacks-how-to-stop-them/</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>Microsoft is rolling out a series of new-ish security features across Microsoft 365 in 2026 — and these updates are no accident. They’re direct responses to how attackers are exploiting collaboration tools like Teams, Slack, Zoom, and Google Chat. In this episode, Sherri and Matt break down the five features that matter most, why they’re happening now, and how every organization can benefit from these lessons, even if you’re not a Microsoft shop. </p>
<p>We explore the rise of impersonation attacks inside collaboration platforms, the security implications of AI copilots like Microsoft Copilot and Gemini, and why identity boundaries and data governance are quickly becoming foundational to modern security programs. You’ll come away with a clear understanding of what these new-ish Microsoft features signal about the evolving threat landscape — and practical steps you can take today to strengthen your security posture. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Treat collaboration platforms as high-risk communication channels. Attackers increasingly use Teams, Slack, Zoom, and similar tools to impersonate coworkers or support staff, and organizations should help employees verify unexpected contacts just as rigorously as they verify email. </li>
<li>Make it easy for users to report suspicious activity. Whether or not your platform offers a built-in reporting feature like Microsoft’s suspicious-call button, employees need a simple, well-understood way to escalate strange messages or calls inside collaboration tools. </li>
<li>Monitor external collaboration for anomalies. Microsoft’s new anomaly report highlights a growing need across all ecosystems to watch for unexpected domains, unusual activity patterns, and impersonation attempts that occur through external collaboration channels. </li>
<li>Classify and label sensitive data before enabling AI assistants. AI tools such as Copilot, Gemini, and Slack GPT inherit user permissions and may access far more information than intended if organizations haven’t established clear sensitivity labels and access boundaries. </li>
<li>Enforce identity and tenant boundaries to limit data leakage. Features like Tenant Restrictions v2 demonstrate the importance of restricting where users can authenticate and ensuring that corporate data stays within approved environments. </li>
<li>Update security training to reflect collaboration-era social engineering. Modern attacks frequently occur through chat messages, impersonated vendor accounts, malicious external domains, or voice/video calls, and training must evolve beyond traditional email-focused programs. </li>
</ol>
<p>Please follow our podcast for the latest cybersecurity advice, and visit us at <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> if you need help with technical testing, cybersecurity consulting, and training!</p>
<p>Resources Mentioned </p>
<ul>
<li>Microsoft 365: Advancing Microsoft 365 – New Capabilities and Pricing Update: <a href='https://www.microsoft.com/en-us/microsoft-365/blog/2025/12/04/advancing-microsoft-365-new-capabilities-and-pricing-update/'>https://www.microsoft.com/en-us/microsoft-365/blog/2025/12/04/advancing-microsoft-365-new-capabilities-and-pricing-update/</a> </li>
</ul>
<ul>
<li>Microsoft 365 Roadmap – Suspicious Call Reporting (ID 536573): <a href='https://www.microsoft.com/en-us/microsoft-365/roadmap?id=536573'>https://www.microsoft.com/en-us/microsoft-365/roadmap?id=536573</a> </li>
</ul>
<ul>
<li>Check Point Research: Exploiting Trust in Microsoft Teams: <a href='https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/'>https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/</a> </li>
<li>Phishing Susceptibility Study (arXiv):  <a href='https://arxiv.org/abs/2510.27298'>https://arxiv.org/abs/2510.27298</a> <br>
</li>
<li>LMG Security Video: Email Bombing &amp; IT Helpdesk Spoofing Attacks—How to Stop Them: <a href='https://www.lmgsecurity.com/videos/email-bombing-it-helpdesk-spoofing-attacks-how-to-stop-them/'>https://www.lmgsecurity.com/videos/email-bombing-it-helpdesk-spoofing-attacks-how-to-stop-them/</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6sdfg6p59qjvpzbb/CSChats_51awo6l-vty9i7-Optimized.mp3" length="20596622" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Microsoft is rolling out a series of new-ish security features across Microsoft 365 in 2026 — and these updates are no accident. They’re direct responses to how attackers are exploiting collaboration tools like Teams, Slack, Zoom, and Google Chat. In this episode, Sherri and Matt break down the five features that matter most, why they’re happening now, and how every organization can benefit from these lessons, even if you’re not a Microsoft shop. 
We explore the rise of impersonation attacks inside collaboration platforms, the security implications of AI copilots like Microsoft Copilot and Gemini, and why identity boundaries and data governance are quickly becoming foundational to modern security programs. You’ll come away with a clear understanding of what these new-ish Microsoft features signal about the evolving threat landscape — and practical steps you can take today to strengthen your security posture. 
 
Key Takeaways 

Treat collaboration platforms as high-risk communication channels. Attackers increasingly use Teams, Slack, Zoom, and similar tools to impersonate coworkers or support staff, and organizations should help employees verify unexpected contacts just as rigorously as they verify email. 
Make it easy for users to report suspicious activity. Whether or not your platform offers a built-in reporting feature like Microsoft’s suspicious-call button, employees need a simple, well-understood way to escalate strange messages or calls inside collaboration tools. 
Monitor external collaboration for anomalies. Microsoft’s new anomaly report highlights a growing need across all ecosystems to watch for unexpected domains, unusual activity patterns, and impersonation attempts that occur through external collaboration channels. 
Classify and label sensitive data before enabling AI assistants. AI tools such as Copilot, Gemini, and Slack GPT inherit user permissions and may access far more information than intended if organizations haven’t established clear sensitivity labels and access boundaries. 
Enforce identity and tenant boundaries to limit data leakage. Features like Tenant Restrictions v2 demonstrate the importance of restricting where users can authenticate and ensuring that corporate data stays within approved environments. 
Update security training to reflect collaboration-era social engineering. Modern attacks frequently occur through chat messages, impersonated vendor accounts, malicious external domains, or voice/video calls, and training must evolve beyond traditional email-focused programs. 

Please follow our podcast for the latest cybersecurity advice, and visit us at www.LMGsecurity.com if you need help with technical testing, cybersecurity consulting, and training!
Resources Mentioned 

Microsoft 365: Advancing Microsoft 365 – New Capabilities and Pricing Update: https://www.microsoft.com/en-us/microsoft-365/blog/2025/12/04/advancing-microsoft-365-new-capabilities-and-pricing-update/ 


Microsoft 365 Roadmap – Suspicious Call Reporting (ID 536573): https://www.microsoft.com/en-us/microsoft-365/roadmap?id=536573 


Check Point Research: Exploiting Trust in Microsoft Teams: https://blog.checkpoint.com/research/exploiting-trust-in-collaboration-microsoft-teams-vulnerabilities-uncovered/ 
Phishing Susceptibility Study (arXiv):  https://arxiv.org/abs/2510.27298 
LMG Security Video: Email Bombing &amp; IT Helpdesk Spoofing Attacks—How to Stop Them: https://www.lmgsecurity.com/videos/email-bombing-it-helpdesk-spoofing-attacks-how-to-stop-them/ 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1249</itunes:duration>
                <itunes:episode>50</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/t57y9bf79xnv6gcn/CSChats_51awo6l-vty9i7-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/a3p637wcnekqirui/CSChats_51awo6l-vty9i7-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack</title>
        <itunes:title>The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack</itunes:title>
        <link>https://www.chatcyberside.com/e/shady-panda-s-browser-backdoor-%e2%80%94-43m-chrome-edge-users-compromised/</link>
                    <comments>https://www.chatcyberside.com/e/shady-panda-s-browser-backdoor-%e2%80%94-43m-chrome-edge-users-compromised/#comments</comments>        <pubDate>Tue, 09 Dec 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/98184650-8530-3b76-9f95-7b7f42ebc2ed</guid>
                                    <description><![CDATA[<p>A massive 7-year espionage campaign hid in plain sight. Harmless Chrome and Edge extensions — wallpaper tools, tab managers, PDF converters — suddenly flipped into full surveillance implants, impacting more than 4.3 million users. In this episode, we break down how ShadyPanda built trust over years, then weaponized auto-updates to steal browsing history, authentication tokens, and even live session cookies. We’ll walk through the timeline, what data was stolen, why session hijacking makes this attack so dangerous, and the key steps security leaders must take now to prevent similar extension-based compromises. </p>
<p>Key Takeaways </p>
<ol>
<li> Audit and restrict browser extensions across the organization. Inventory all extensions in use, remove unnecessary ones, and enforce an allowlist through enterprise browser controls. </li>
</ol>
<ol start="2">
<li> Treat extensions as part of your software supply chain. Extensions can flip from safe to malicious overnight. Include them in risk assessments and governance processes. </li>
</ol>
<ol start="3">
<li> Detect and mitigate session hijacking. Monitor for unusual token reuse, shorten token lifetimes where possible, and watch for logins that bypass MFA. </li>
</ol>
<ol start="4">
<li> Enforce enterprise browser security controls. Use Chrome/Edge enterprise features or MDM to lock down permissions, block unapproved installations, and enable safe browsing modes. </li>
</ol>
<ol start="5">
<li> Reduce extension sprawl with policy and training. Educate employees that extensions carry real security risk. Require justification for new installations and empower IT to remove unnecessary ones. </li>
</ol>
<p>Please tune in weekly for more cybersecurity advice, and visit www.LMGsecurity.com if you need help with your cybersecurity testing, advisory services, and training. </p>
<p>
Resources: </p>
<ul>
<li>KOI Intelligence (Original Research): <a href='https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign'>https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign</a> </li>
</ul>
<ul>
<li>Malwarebytes Labs Coverage: <a href='https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices'>https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices</a> </li>
</ul>
<ul>
<li>Infosecurity Magazine Article: <a href='https://www.infosecurity-magazine.com/news/shadypanda-infects-43m-chrome-edge/'>https://www.infosecurity-magazine.com/news/shadypanda-infects-43m-chrome-edge/</a> </li>
</ul>
<p>#ShadyPanda #browserextension #browsersecurity #cybersecurity #cyberaware #infosec #cyberattacks #ciso </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>A massive 7-year espionage campaign hid in plain sight. Harmless Chrome and Edge extensions — wallpaper tools, tab managers, PDF converters — suddenly flipped into full surveillance implants, impacting more than 4.3 million users. In this episode, we break down how ShadyPanda built trust over years, then weaponized auto-updates to steal browsing history, authentication tokens, and even live session cookies. We’ll walk through the timeline, what data was stolen, why session hijacking makes this attack so dangerous, and the key steps security leaders must take now to prevent similar extension-based compromises. </p>
<p>Key Takeaways </p>
<ol>
<li> Audit and restrict browser extensions across the organization. Inventory all extensions in use, remove unnecessary ones, and enforce an allowlist through enterprise browser controls. </li>
</ol>
<ol start="2">
<li> Treat extensions as part of your software supply chain. Extensions can flip from safe to malicious overnight. Include them in risk assessments and governance processes. </li>
</ol>
<ol start="3">
<li> Detect and mitigate session hijacking. Monitor for unusual token reuse, shorten token lifetimes where possible, and watch for logins that bypass MFA. </li>
</ol>
<ol start="4">
<li> Enforce enterprise browser security controls. Use Chrome/Edge enterprise features or MDM to lock down permissions, block unapproved installations, and enable safe browsing modes. </li>
</ol>
<ol start="5">
<li> Reduce extension sprawl with policy and training. Educate employees that extensions carry real security risk. Require justification for new installations and empower IT to remove unnecessary ones. </li>
</ol>
<p>Please tune in weekly for more cybersecurity advice, and visit www.LMGsecurity.com if you need help with your cybersecurity testing, advisory services, and training. </p>
<p><br>
Resources: </p>
<ul>
<li>KOI Intelligence (Original Research): <a href='https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign'>https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign</a> </li>
</ul>
<ul>
<li>Malwarebytes Labs Coverage: <a href='https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices'>https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices</a> </li>
</ul>
<ul>
<li>Infosecurity Magazine Article: <a href='https://www.infosecurity-magazine.com/news/shadypanda-infects-43m-chrome-edge/'>https://www.infosecurity-magazine.com/news/shadypanda-infects-43m-chrome-edge/</a> </li>
</ul>
<p>#ShadyPanda #browserextension #browsersecurity #cybersecurity #cyberaware #infosec #cyberattacks #ciso </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mqeu8rv7kgx7epur/CSChats_507dcq2-h5t6ui-Optimized.mp3" length="23439591" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A massive 7-year espionage campaign hid in plain sight. Harmless Chrome and Edge extensions — wallpaper tools, tab managers, PDF converters — suddenly flipped into full surveillance implants, impacting more than 4.3 million users. In this episode, we break down how ShadyPanda built trust over years, then weaponized auto-updates to steal browsing history, authentication tokens, and even live session cookies. We’ll walk through the timeline, what data was stolen, why session hijacking makes this attack so dangerous, and the key steps security leaders must take now to prevent similar extension-based compromises. 
Key Takeaways 

 Audit and restrict browser extensions across the organization. Inventory all extensions in use, remove unnecessary ones, and enforce an allowlist through enterprise browser controls. 


 Treat extensions as part of your software supply chain. Extensions can flip from safe to malicious overnight. Include them in risk assessments and governance processes. 


 Detect and mitigate session hijacking. Monitor for unusual token reuse, shorten token lifetimes where possible, and watch for logins that bypass MFA. 


 Enforce enterprise browser security controls. Use Chrome/Edge enterprise features or MDM to lock down permissions, block unapproved installations, and enable safe browsing modes. 


 Reduce extension sprawl with policy and training. Educate employees that extensions carry real security risk. Require justification for new installations and empower IT to remove unnecessary ones. 

Please tune in weekly for more cybersecurity advice, and visit www.LMGsecurity.com if you need help with your cybersecurity testing, advisory services, and training. 
Resources: 

KOI Intelligence (Original Research): https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign 


Malwarebytes Labs Coverage: https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices 


Infosecurity Magazine Article: https://www.infosecurity-magazine.com/news/shadypanda-infects-43m-chrome-edge/ 

#ShadyPanda #browserextension #browsersecurity #cybersecurity #cyberaware #infosec #cyberattacks #ciso ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1258</itunes:duration>
                <itunes:episode>49</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/amn5ta9z75qppdtb/CSChats_507dcq2-h5t6ui-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/bdfvim28gvmjti2s/CSChats_507dcq2-h5t6ui-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Inside Jobs: How CrowdStrike, DigitalMint &amp; Tesla Got Burned</title>
        <itunes:title>Inside Jobs: How CrowdStrike, DigitalMint &amp; Tesla Got Burned</itunes:title>
        <link>https://www.chatcyberside.com/e/when-security-fails-crowdstrike-insider-leaks-and-the-threat-within/</link>
                    <comments>https://www.chatcyberside.com/e/when-security-fails-crowdstrike-insider-leaks-and-the-threat-within/#comments</comments>        <pubDate>Tue, 02 Dec 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/ef5aed3b-5659-32bc-97cc-88a5a6c3e984</guid>
                                    <description><![CDATA[<p>Insider threats are accelerating across every sector. In this episode, Sherri and Matt unpack the CrowdStrike insider leak, the two DigitalMint employees indicted for BlackCat ransomware activity, and Tesla’s multi-year insider incidents ranging from nation-state bribery to post-termination extortion. They also examine the 2025 crackdown on North Korean operatives who used stolen identities and deepfake interviews to get hired as remote workers inside U.S. companies. Together, these cases reveal how attackers are buying, recruiting, impersonating, and embedding insiders — and why organizations must rethink how they detect and manage trusted access. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li> Build a culture of ethics and make legal consequences explicit.
 Use real cases — Tesla, CrowdStrike, DigitalMint — to show employees that insider misconduct leads to indictments and prison time. Clear messaging, training, and leadership visibility reinforce deterrence.</li>
<li> Enforce least-privilege access and conduct quarterly access reviews.
 Limit who can view or modify sensitive dashboards, admin tools, and SSO consoles. Regular recertification ensures employees only retain the permissions they legitimately need.</li>
<li> Deploy screenshot prevention and data-leak controls across critical systems.
 Implement watermarking, VDI/browser isolation, screenshot detection, and DLP/CASB rules to deter and detect unauthorized capture or exfiltration of sensitive data.</li>
<li> Strengthen identity verification for remote and distributed employees.
 Use periodic identity rechecks and require company-managed, attested devices for sensitive roles. Prohibit personal-device access for privileged work to reduce impersonation risk.</li>
<li> Monitor high-risk users with behavior and anomaly analytics.
 Flag unusual patterns such as off-hours access, atypical data movement, sudden repository interest, or crypto-related activity on work devices. Behavioral analytics helps uncover malicious intent even when credentials appear valid.</li>
<li> Require your vendors to follow the same insider-threat safeguards you use internally.
 Ensure MSPs, SaaS providers, IR partners, and software vendors enforce strong access controls, identity verification, monitoring, and device security. Vendor insiders can quickly become your insiders.</li>
</ol>
<p>Resources: </p>
<ul>
<li>TechCrunch – CrowdStrike insider leak coverage: <a href='https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/'>https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/</a> </li>
</ul>
<ul>
<li>Reuters – DigitalMint ransomware indictment reporting: <a href='https://www.reuters.com/legal/government/us-prosecutors-say-cybersecurity-pros-ran-cybercrime-operation-2025-11-03/'>https://www.reuters.com/legal/government/us-prosecutors-say-cybersecurity-pros-ran-cybercrime-operation-2025-11-03/</a> </li>
</ul>
<ul>
<li>BleepingComputer – North Korean fake remote worker scheme: <a href='https://www.bleepingcomputer.com/news/security/us-arrests-key-facilitator-in-north-korean-it-worker-fraud-scheme/'>https://www.bleepingcomputer.com/news/security/us-arrests-key-facilitator-in-north-korean-it-worker-fraud-scheme/</a> </li>
</ul>
<ul>
<li>“Ransomware and Cyber Extortion: Response and Prevention” (Book by Sherri &amp; Matt &amp; Karen): <a href='https://www.amazon.com/Ransomware-Cyber-Extortion-Response-Prevention-ebook/dp/B09RV4FPP9'>https://www.amazon.com/Ransomware-Cyber-Extortion-Response-Prevention-ebook/dp/B09RV4FPP9</a> </li>
</ul>
<ul>
<li>LMG’s Hiring Security Checklist: <a href='https://www.lmgsecurity.com/resources/hiring-security-checklist/'>https://www.lmgsecurity.com/resources/hiring-security-checklist/</a> </li>
</ul>
<p>Want to attend a live version of Cyberside Chats? Visit us at <a href='https://www.lmgsecurity.com/lmg-resources/cyberside-chats-podcast/'>https://www.lmgsecurity.com/lmg-resources/cyberside-chats-podcast/</a> to register for our next monthly live session. </p>
<p> </p>
<p>#insiderthreat #cybersecurity #cyberaware #cybersidechats #ransomware #ransomwareattack #crowdstrike #DigitalMint #tesla #remotework</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Insider threats are accelerating across every sector. In this episode, Sherri and Matt unpack the CrowdStrike insider leak, the two DigitalMint employees indicted for BlackCat ransomware activity, and Tesla’s multi-year insider incidents ranging from nation-state bribery to post-termination extortion. They also examine the 2025 crackdown on North Korean operatives who used stolen identities and deepfake interviews to get hired as remote workers inside U.S. companies. Together, these cases reveal how attackers are buying, recruiting, impersonating, and embedding insiders — and why organizations must rethink how they detect and manage trusted access. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li> Build a culture of ethics and make legal consequences explicit.<br>
 Use real cases — Tesla, CrowdStrike, DigitalMint — to show employees that insider misconduct leads to indictments and prison time. Clear messaging, training, and leadership visibility reinforce deterrence.</li>
<li> Enforce least-privilege access and conduct quarterly access reviews.<br>
 Limit who can view or modify sensitive dashboards, admin tools, and SSO consoles. Regular recertification ensures employees only retain the permissions they legitimately need.</li>
<li> Deploy screenshot prevention and data-leak controls across critical systems.<br>
 Implement watermarking, VDI/browser isolation, screenshot detection, and DLP/CASB rules to deter and detect unauthorized capture or exfiltration of sensitive data.</li>
<li> Strengthen identity verification for remote and distributed employees.<br>
 Use periodic identity rechecks and require company-managed, attested devices for sensitive roles. Prohibit personal-device access for privileged work to reduce impersonation risk.</li>
<li> Monitor high-risk users with behavior and anomaly analytics.<br>
 Flag unusual patterns such as off-hours access, atypical data movement, sudden repository interest, or crypto-related activity on work devices. Behavioral analytics helps uncover malicious intent even when credentials appear valid.</li>
<li> Require your vendors to follow the same insider-threat safeguards you use internally.<br>
 Ensure MSPs, SaaS providers, IR partners, and software vendors enforce strong access controls, identity verification, monitoring, and device security. Vendor insiders can quickly become <em>your</em> insiders.</li>
</ol>
<p>Resources: </p>
<ul>
<li>TechCrunch – CrowdStrike insider leak coverage: <a href='https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/'>https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/</a> </li>
</ul>
<ul>
<li>Reuters – DigitalMint ransomware indictment reporting: <a href='https://www.reuters.com/legal/government/us-prosecutors-say-cybersecurity-pros-ran-cybercrime-operation-2025-11-03/'>https://www.reuters.com/legal/government/us-prosecutors-say-cybersecurity-pros-ran-cybercrime-operation-2025-11-03/</a> </li>
</ul>
<ul>
<li>BleepingComputer – North Korean fake remote worker scheme: <a href='https://www.bleepingcomputer.com/news/security/us-arrests-key-facilitator-in-north-korean-it-worker-fraud-scheme/'>https://www.bleepingcomputer.com/news/security/us-arrests-key-facilitator-in-north-korean-it-worker-fraud-scheme/</a> </li>
</ul>
<ul>
<li>“Ransomware and Cyber Extortion: Response and Prevention” (Book by Sherri &amp; Matt &amp; Karen): <a href='https://www.amazon.com/Ransomware-Cyber-Extortion-Response-Prevention-ebook/dp/B09RV4FPP9'>https://www.amazon.com/Ransomware-Cyber-Extortion-Response-Prevention-ebook/dp/B09RV4FPP9</a> </li>
</ul>
<ul>
<li>LMG’s Hiring Security Checklist: <a href='https://www.lmgsecurity.com/resources/hiring-security-checklist/'>https://www.lmgsecurity.com/resources/hiring-security-checklist/</a> </li>
</ul>
<p>Want to attend a live version of Cyberside Chats? Visit us at <a href='https://www.lmgsecurity.com/lmg-resources/cyberside-chats-podcast/'>https://www.lmgsecurity.com/lmg-resources/cyberside-chats-podcast/</a> to register for our next monthly live session. </p>
<p> </p>
<p>#insiderthreat #cybersecurity #cyberaware #cybersidechats #ransomware #ransomwareattack #crowdstrike #DigitalMint #tesla #remotework</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/952yk4u6ukc2dbit/CSChats_497oxti-33n58w-Optimized.mp3" length="23126653" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Insider threats are accelerating across every sector. In this episode, Sherri and Matt unpack the CrowdStrike insider leak, the two DigitalMint employees indicted for BlackCat ransomware activity, and Tesla’s multi-year insider incidents ranging from nation-state bribery to post-termination extortion. They also examine the 2025 crackdown on North Korean operatives who used stolen identities and deepfake interviews to get hired as remote workers inside U.S. companies. Together, these cases reveal how attackers are buying, recruiting, impersonating, and embedding insiders — and why organizations must rethink how they detect and manage trusted access. 
 
Key Takeaways 

 Build a culture of ethics and make legal consequences explicit. Use real cases — Tesla, CrowdStrike, DigitalMint — to show employees that insider misconduct leads to indictments and prison time. Clear messaging, training, and leadership visibility reinforce deterrence.
 Enforce least-privilege access and conduct quarterly access reviews. Limit who can view or modify sensitive dashboards, admin tools, and SSO consoles. Regular recertification ensures employees only retain the permissions they legitimately need.
 Deploy screenshot prevention and data-leak controls across critical systems. Implement watermarking, VDI/browser isolation, screenshot detection, and DLP/CASB rules to deter and detect unauthorized capture or exfiltration of sensitive data.
 Strengthen identity verification for remote and distributed employees. Use periodic identity rechecks and require company-managed, attested devices for sensitive roles. Prohibit personal-device access for privileged work to reduce impersonation risk.
 Monitor high-risk users with behavior and anomaly analytics. Flag unusual patterns such as off-hours access, atypical data movement, sudden repository interest, or crypto-related activity on work devices. Behavioral analytics helps uncover malicious intent even when credentials appear valid.
 Require your vendors to follow the same insider-threat safeguards you use internally. Ensure MSPs, SaaS providers, IR partners, and software vendors enforce strong access controls, identity verification, monitoring, and device security. Vendor insiders can quickly become your insiders.

Resources: 

TechCrunch – CrowdStrike insider leak coverage: https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/ 


Reuters – DigitalMint ransomware indictment reporting: https://www.reuters.com/legal/government/us-prosecutors-say-cybersecurity-pros-ran-cybercrime-operation-2025-11-03/ 


BleepingComputer – North Korean fake remote worker scheme: https://www.bleepingcomputer.com/news/security/us-arrests-key-facilitator-in-north-korean-it-worker-fraud-scheme/ 


“Ransomware and Cyber Extortion: Response and Prevention” (Book by Sherri &amp; Matt &amp; Karen): https://www.amazon.com/Ransomware-Cyber-Extortion-Response-Prevention-ebook/dp/B09RV4FPP9 


LMG’s Hiring Security Checklist: https://www.lmgsecurity.com/resources/hiring-security-checklist/ 

Want to attend a live version of Cyberside Chats? Visit us at https://www.lmgsecurity.com/lmg-resources/cyberside-chats-podcast/ to register for our next monthly live session. 
 
#insiderthreat #cybersecurity #cyberaware #cybersidechats #ransomware #ransomwareattack #crowdstrike #DigitalMint #tesla #remotework]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1407</itunes:duration>
                <itunes:episode>48</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/fjesfk6byv2y29v3/CSChats_497oxti-33n58w-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/8s4q88ywcf3weirz/CSChats_497oxti-33n58w-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Made in China—Hacked Everywhere?</title>
        <itunes:title>Made in China—Hacked Everywhere?</itunes:title>
        <link>https://www.chatcyberside.com/e/chinas-hidden-backdoors-buses-cranes-and-critical-infrastructure/</link>
                    <comments>https://www.chatcyberside.com/e/chinas-hidden-backdoors-buses-cranes-and-critical-infrastructure/#comments</comments>        <pubDate>Tue, 25 Nov 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/f160df08-8b41-36c8-a10c-a224d347737f</guid>
                                    <description><![CDATA[<p>From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere—including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. </p>
<p>We’ll break down new government warnings about hidden communication modules, rogue firmware, and “ghost devices” in imported tech—and how even trusted brands may ship products with risky components. Most importantly, we’ll share what you can do right now to identify exposure, strengthen procurement and third-party risk management (TPRM) processes, and protect your organization before the next breach or regulation hits. </p>
<p>Join us live for a 25-minute deep dive plus Q&amp;A—and find out whether your supply chain is truly secure… or “Made in China—and Hacked Everywhere.” </p>
<p>Key Takeaways: </p>
<ol>
<li>Require an Access Bill of Materials (ABOM) for every connected device. Ask vendors to disclose all remote access paths, cloud services, SIMs/radios, update servers, and subcontractors. This is the most effective way to catch hidden modems, undocumented connectivity, or offshore control channels before procurement. </li>
</ol>
<ol start="2">
<li> Treat hardware procurement with the same rigor as software supply chain risk. Routers, cameras, inverters, and vehicles must be vetted like software: know the origin of components, how firmware is managed, and who can control or modify the device. This mindset shift prevents accidental onboarding of hidden risks. </li>
</ol>
<ol start="3">
<li> Establish and enforce a simple connected-device procurement policy. Set clear rules: no undocumented connectivity, no unmanaged remote access, no end-of-life firmware in new buys, and mandatory security review for all "smart" devices. This helps buyers avoid risky equipment even when budgets are tight. </li>
</ol>
<ol start="4">
<li> Reduce exposure through segmentation and access restrictions. Before replacing anything, isolate high-risk devices, block unnecessary outbound traffic, and disable vendor remote access. These low-cost steps significantly reduce exposure while giving you time to plan longer-term changes. </li>
</ol>
<ol start="5">
<li> Strengthen third-party risk management (TPRM) for vendors of connected equipment. Expand TPRM reviews to cover firmware integrity, logging, hosting jurisdictions, remote access practices, and subcontractors. This ensures your vendor ecosystem doesn't introduce avoidable hardware-level vulnerabilities. </li>
</ol>
<p> </p>
<p>References: </p>
<ul>
<li>Wall Street Journal (Nov 19, 2025) – <a href='https://www.wsj.com/business/can-chinese-made-buses-be-hacked-norway-drove-one-down-a-mine-to-find-out-fbda755f'>“Can Chinese-Made Buses Be Hacked? Norway Drove One Down a Mine to Find Out.”</a> (Chinese electric bus remote-disable and SIM access findings) </li>
<li>U.S. House Select Committee on China &amp; House Homeland Security Committee (Sept 2024 Report) – <a href='https://therecord.media/port-cranes-china-modems-republican-house-report'>Port Crane Security Assessment.</a> (Unauthorized modems, supply-chain backdoors, and ZPMC risk findings) </li>
<li>FDA &amp; CISA (Feb–Mar 2025) – <a href='https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor'>Security Advisory: Contec CMS8000 Patient Monitor.</a> (Backdoor enabling remote file execution and hidden network communications) </li>
<li>Anthropic (Nov 13, 2025) – <a href='https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf'>“Disrupting the First Reported AI-Orchestrated Cyber Espionage Campaign.”</a> 
(China-linked AI-driven intrusion playbook and campaign analysis) </li>
<li>LMG Security (2025) – “9 Tips to Streamline Your Vendor Risk Management Program.” 
<a href='https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program'>https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program</a> </li>
</ul>
<p>#chinesehackers #cybersecurity #infosec #LMGsecurity #ciso #TPRM #thirdpartyrisk  #security</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere—including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. </p>
<p>We’ll break down new government warnings about hidden communication modules, rogue firmware, and “ghost devices” in imported tech—and how even trusted brands may ship products with risky components. Most importantly, we’ll share what you can do right now to identify exposure, strengthen procurement and third-party risk management (TPRM) processes, and protect your organization before the next breach or regulation hits. </p>
<p>Join us live for a 25-minute deep dive plus Q&amp;A—and find out whether your supply chain is truly secure… or “Made in China—and Hacked Everywhere.” </p>
<p>Key Takeaways: </p>
<ol>
<li>Require an Access Bill of Materials (ABOM) for every connected device. Ask vendors to disclose all remote access paths, cloud services, SIMs/radios, update servers, and subcontractors. This is the most effective way to catch hidden modems, undocumented connectivity, or offshore control channels before procurement. </li>
</ol>
<ol start="2">
<li> Treat hardware procurement with the same rigor as software supply chain risk. Routers, cameras, inverters, and vehicles must be vetted like software: know the origin of components, how firmware is managed, and who can control or modify the device. This mindset shift prevents accidental onboarding of hidden risks. </li>
</ol>
<ol start="3">
<li> Establish and enforce a simple connected-device procurement policy. Set clear rules: no undocumented connectivity, no unmanaged remote access, no end-of-life firmware in new buys, and mandatory security review for all "smart" devices. This helps buyers avoid risky equipment even when budgets are tight. </li>
</ol>
<ol start="4">
<li> Reduce exposure through segmentation and access restrictions. Before replacing anything, isolate high-risk devices, block unnecessary outbound traffic, and disable vendor remote access. These low-cost steps significantly reduce exposure while giving you time to plan longer-term changes. </li>
</ol>
<ol start="5">
<li> Strengthen third-party risk management (TPRM) for vendors of connected equipment. Expand TPRM reviews to cover firmware integrity, logging, hosting jurisdictions, remote access practices, and subcontractors. This ensures your vendor ecosystem doesn't introduce avoidable hardware-level vulnerabilities. </li>
</ol>
<p> </p>
<p>References: </p>
<ul>
<li>Wall Street Journal (Nov 19, 2025) – <a href='https://www.wsj.com/business/can-chinese-made-buses-be-hacked-norway-drove-one-down-a-mine-to-find-out-fbda755f'>“Can Chinese-Made Buses Be Hacked? Norway Drove One Down a Mine to Find Out.”</a> (Chinese electric bus remote-disable and SIM access findings) </li>
<li>U.S. House Select Committee on China &amp; House Homeland Security Committee (Sept 2024 Report) – <a href='https://therecord.media/port-cranes-china-modems-republican-house-report'>Port Crane Security Assessment.</a> (Unauthorized modems, supply-chain backdoors, and ZPMC risk findings) </li>
<li>FDA &amp; CISA (Feb–Mar 2025) – <a href='https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor'>Security Advisory: Contec CMS8000 Patient Monitor.</a> (Backdoor enabling remote file execution and hidden network communications) </li>
<li>Anthropic (Nov 13, 2025) – <a href='https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf'>“Disrupting the First Reported AI-Orchestrated Cyber Espionage Campaign.”</a> <br>
(China-linked AI-driven intrusion playbook and campaign analysis) </li>
<li>LMG Security (2025) – <em>“9 Tips to Streamline Your Vendor Risk Management Program.”</em> <br>
<a href='https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program'>https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program</a> </li>
</ul>
<p>#chinesehackers #cybersecurity #infosec #LMGsecurity #ciso #TPRM #thirdpartyrisk  #security</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hif64ymy8bux3gsz/CSChats_48bmp0y-p466qg-Optimized.mp3" length="28044589" type="audio/mpeg"/>
        <itunes:summary><![CDATA[From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere—including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. 
We’ll break down new government warnings about hidden communication modules, rogue firmware, and “ghost devices” in imported tech—and how even trusted brands may ship products with risky components. Most importantly, we’ll share what you can do right now to identify exposure, strengthen procurement and third-party risk management (TPRM) processes, and protect your organization before the next breach or regulation hits. 
Join us live for a 25-minute deep dive plus Q&amp;A—and find out whether your supply chain is truly secure… or “Made in China—and Hacked Everywhere.” 
Key Takeaways: 

Require an Access Bill of Materials (ABOM) for every connected device. Ask vendors to disclose all remote access paths, cloud services, SIMs/radios, update servers, and subcontractors. This is the most effective way to catch hidden modems, undocumented connectivity, or offshore control channels before procurement. 


 Treat hardware procurement with the same rigor as software supply chain risk. Routers, cameras, inverters, and vehicles must be vetted like software: know the origin of components, how firmware is managed, and who can control or modify the device. This mindset shift prevents accidental onboarding of hidden risks. 


 Establish and enforce a simple connected-device procurement policy. Set clear rules: no undocumented connectivity, no unmanaged remote access, no end-of-life firmware in new buys, and mandatory security review for all "smart" devices. This helps buyers avoid risky equipment even when budgets are tight. 


 Reduce exposure through segmentation and access restrictions. Before replacing anything, isolate high-risk devices, block unnecessary outbound traffic, and disable vendor remote access. These low-cost steps significantly reduce exposure while giving you time to plan longer-term changes. 


 Strengthen third-party risk management (TPRM) for vendors of connected equipment. Expand TPRM reviews to cover firmware integrity, logging, hosting jurisdictions, remote access practices, and subcontractors. This ensures your vendor ecosystem doesn't introduce avoidable hardware-level vulnerabilities. 

 
References: 

Wall Street Journal (Nov 19, 2025) – “Can Chinese-Made Buses Be Hacked? Norway Drove One Down a Mine to Find Out.” (Chinese electric bus remote-disable and SIM access findings) 
U.S. House Select Committee on China &amp; House Homeland Security Committee (Sept 2024 Report) – Port Crane Security Assessment. (Unauthorized modems, supply-chain backdoors, and ZPMC risk findings) 
FDA &amp; CISA (Feb–Mar 2025) – Security Advisory: Contec CMS8000 Patient Monitor. (Backdoor enabling remote file execution and hidden network communications) 
Anthropic (Nov 13, 2025) – “Disrupting the First Reported AI-Orchestrated Cyber Espionage Campaign.” (China-linked AI-driven intrusion playbook and campaign analysis) 
LMG Security (2025) – “9 Tips to Streamline Your Vendor Risk Management Program.” https://www.lmgsecurity.com/9-tips-to-streamline-your-vendor-risk-management-program 

#chinesehackers #cybersecurity #infosec #LMGsecurity #ciso #TPRM #thirdpartyrisk  #security]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1546</itunes:duration>
                <itunes:episode>47</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/4upbsdvw2j6j7wcb/CSChats_48bmp0y-p466qg-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/wf4b33eu34m8sp4e/CSChats_48bmp0y-p466qg-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Holiday Hackers—The 2025 AI Fraud Boom</title>
        <itunes:title>Holiday Hackers—The 2025 AI Fraud Boom</itunes:title>
        <link>https://www.chatcyberside.com/e/holiday-hack-alert-ai-bots-phishing-and-the-gift-card-scam-surge/</link>
                    <comments>https://www.chatcyberside.com/e/holiday-hack-alert-ai-bots-phishing-and-the-gift-card-scam-surge/#comments</comments>        <pubDate>Tue, 18 Nov 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/63e80634-8f71-3819-939c-911441733d79</guid>
                                    <description><![CDATA[<p>Hackers are using AI to supercharge holiday scams—flooding the web with fake ads, phishing pages, and credential-stealing bots. This season, researchers predict a record spike in automated attacks and malvertising campaigns that blur the line between human and machine. Sherri Davidoff and Matt Durrin break down what’s new this holiday season—from AI-generated phishing kits and bot-driven account takeovers to the rise of prebuilt “configs” for credential stuffing. We used WormGPT to produce a ready-to-run holiday phishing page—a proof-of-concept that demonstrates how quickly scammers can launch these attacks with evil AI tools. This episode reveals how personal habits turn into corporate risk. Before Black Friday and Christmas hit, learn what your team can do right now to protect people, passwords, and payments. </p>
<p>Key Takeaways – How to Defend Against the 2025 AI Fraud Boom </p>
<ol>
<li>Treat holiday scams as a business risk, not just a retail problem. 
 Automated bots, fake ads, and AI-generated phishing campaigns target your employees too — not just shoppers. Expect higher attack volume through the entire holiday season. </li>
</ol>
<ol>
<li>Expect password reuse—and enforce strong MFA everywhere. 
 Employees will reuse personal shopping passwords at work. Require MFA on all accounts — especially SSO, admin, and vendor logins — and block reused credentials where possible. </li>
</ol>
<ol>
<li>Filter out malicious ads and spoofed sites. 
 Use DNS and web filtering to block malvertising and look-alike domains. Encourage staff to verify URLs and avoid “too-good-to-be-true” promotions or charity appeals. </li>
</ol>
<ol>
<li>Strengthen bot and fraud detection. 
 Tune WAF and bot-management tools to catch automated login attempts, fake account creation, and credential stuffing. These attacks spike before Black Friday and often continue into January. </li>
</ol>
<ol>
<li>Run a short holiday security awareness push before Black Friday—and repeat before Christmas.  Brief all staff, especially finance and customer service, on seasonal scams: gift-card fraud, fake charities, refund and invoice scams, malvertising, and holiday-themed phishing.  </li>
</ol>
<ol>
<li>Remember: personal security is corporate security. 
 BYOD, home shopping, and password reuse mean an employee’s compromise can quickly become your organization’s compromise. Keep the message simple: protect your accounts, protect your company. </li>
</ol>
<p>Don't forget to follow us for more cybersecurity advice, and visit us at <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> for tip sheets, blogs, and more advice!</p>
<p>Resources: </p>
<ol>
<li>RH-ISAC — 2025 Holiday Season Cyber Threat Trends: <a href='https://rhisac.org/press-release/holiday-threats-2025/'>https://rhisac.org/press-release/holiday-threats-2025/</a> (<a href='https://rhisac.org/press-release/holiday-threats-2025/'>RH-ISAC</a>)</li>
<li>Malwarebytes — Home Depot Halloween phish gives users a fright, not a freebie: <a href='https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie'>https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie</a> (<a href='https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie?utm_source=chatgpt.com'>Malwarebytes</a>)</li>
<li>Bitdefender Labs — Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes: <a href='https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds'>https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds</a> (<a href='https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds?utm_source=chatgpt.com'>Bitdefender</a>)</li>
<li>FBI / IC3 PSA — Hacker Com: Cyber Criminal Subset of The Com — background on The Com threat cluster referenced by RH-ISAC and seen in holiday fraud activity: <a href='https://www.ic3.gov/PSA/2025/PSA250723'>https://www.ic3.gov/PSA/2025/PSA250723</a> (<a href='https://www.ic3.gov/PSA/2025/PSA250723?utm_source=chatgpt.com'>Internet Crime Complaint Center</a>)</li>
<li>Fast Company — Holiday season cybersecurity lessons: The vulnerability of the retail workforce: <a href='https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce'>https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce</a> (<a href='https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce?utm_source=chatgpt.com'>Fast Company</a>) </li>
</ol>
<p> #HolidayScams #Phishing #Malvertising #Cybersecurity #Cyberaware #SMB #BlackFridayScams</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hackers are using AI to supercharge holiday scams—flooding the web with fake ads, phishing pages, and credential-stealing bots. This season, researchers predict a record spike in automated attacks and malvertising campaigns that blur the line between human and machine. Sherri Davidoff and Matt Durrin break down what’s new this holiday season—from AI-generated phishing kits and bot-driven account takeovers to the rise of prebuilt “configs” for credential stuffing. We used WormGPT to produce a ready-to-run holiday phishing page—a proof-of-concept that demonstrates how quickly scammers can launch these attacks with evil AI tools. This episode reveals how personal habits turn into corporate risk. Before Black Friday and Christmas hit, learn what your team can do right now to protect people, passwords, and payments. </p>
<p>Key Takeaways – How to Defend Against the 2025 AI Fraud Boom </p>
<ol>
<li>Treat holiday scams as a business risk, not just a retail problem. <br>
 Automated bots, fake ads, and AI-generated phishing campaigns target <em>your employees</em> too — not just shoppers. Expect higher attack volume through the entire holiday season. </li>
</ol>
<ol>
<li>Expect password reuse—and enforce strong MFA everywhere. <br>
 Employees will reuse personal shopping passwords at work. Require MFA on all accounts — especially SSO, admin, and vendor logins — and block reused credentials where possible. </li>
</ol>
<ol>
<li>Filter out malicious ads and spoofed sites. <br>
 Use DNS and web filtering to block malvertising and look-alike domains. Encourage staff to verify URLs and avoid “too-good-to-be-true” promotions or charity appeals. </li>
</ol>
<ol>
<li>Strengthen bot and fraud detection. <br>
 Tune WAF and bot-management tools to catch automated login attempts, fake account creation, and credential stuffing. These attacks spike before Black Friday and often continue into January. </li>
</ol>
<ol>
<li>Run a short holiday security awareness push before Black Friday—and repeat before Christmas.  Brief all staff, especially finance and customer service, on seasonal scams: gift-card fraud, fake charities, refund and invoice scams, malvertising, and holiday-themed phishing.  </li>
</ol>
<ol>
<li>Remember: personal security <em>is</em> corporate security. <br>
 BYOD, home shopping, and password reuse mean an employee’s compromise can quickly become your organization’s compromise. Keep the message simple: protect your accounts, protect your company. </li>
</ol>
<p>Don't forget to follow us for more cybersecurity advice, and visit us at <a href='http://www.LMGsecurity.com'>www.LMGsecurity.com</a> for tip sheets, blogs, and more advice!</p>
<p>Resources: </p>
<ol>
<li>RH-ISAC — 2025 Holiday Season Cyber Threat Trends: <a href='https://rhisac.org/press-release/holiday-threats-2025/'>https://rhisac.org/press-release/holiday-threats-2025/</a> (<a href='https://rhisac.org/press-release/holiday-threats-2025/'>RH-ISAC</a>)</li>
<li>Malwarebytes — <em>Home Depot Halloween phish gives users a fright, not a freebie: </em><a href='https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie'>https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie</a> (<a href='https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie?utm_source=chatgpt.com'>Malwarebytes</a>)</li>
<li>Bitdefender Labs — <em>Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes: </em><a href='https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds'>https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds</a> (<a href='https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds?utm_source=chatgpt.com'>Bitdefender</a>)</li>
<li>FBI / IC3 PSA — <em>Hacker Com: Cyber Criminal Subset of The Com</em> — background on The Com threat cluster referenced by RH-ISAC and seen in holiday fraud activity: <a href='https://www.ic3.gov/PSA/2025/PSA250723'>https://www.ic3.gov/PSA/2025/PSA250723</a> (<a href='https://www.ic3.gov/PSA/2025/PSA250723?utm_source=chatgpt.com'>Internet Crime Complaint Center</a>)</li>
<li>Fast Company — <em>Holiday season cybersecurity lessons: The vulnerability of the retail workforce: </em><a href='https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce'>https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce</a> (<a href='https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce?utm_source=chatgpt.com'>Fast Company</a>) </li>
</ol>
<p> #HolidayScams #Phishing #Malvertising #Cybersecurity #Cyberaware #SMB #BlackFridayScams</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/j43p4f3ex367g5fg/CSChats_4786lpn-uq6uch-Optimized.mp3" length="16871760" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hackers are using AI to supercharge holiday scams—flooding the web with fake ads, phishing pages, and credential-stealing bots. This season, researchers predict a record spike in automated attacks and malvertising campaigns that blur the line between human and machine. Sherri Davidoff and Matt Durrin break down what’s new this holiday season—from AI-generated phishing kits and bot-driven account takeovers to the rise of prebuilt “configs” for credential stuffing. We used WormGPT to produce a ready-to-run holiday phishing page—a proof-of-concept that demonstrates how quickly scammers can launch these attacks with evil AI tools. This episode reveals how personal habits turn into corporate risk. Before Black Friday and Christmas hit, learn what your team can do right now to protect people, passwords, and payments. 
Key Takeaways – How to Defend Against the 2025 AI Fraud Boom 

Treat holiday scams as a business risk, not just a retail problem.  Automated bots, fake ads, and AI-generated phishing campaigns target your employees too — not just shoppers. Expect higher attack volume through the entire holiday season. 


Expect password reuse—and enforce strong MFA everywhere.  Employees will reuse personal shopping passwords at work. Require MFA on all accounts — especially SSO, admin, and vendor logins — and block reused credentials where possible. 


Filter out malicious ads and spoofed sites.  Use DNS and web filtering to block malvertising and look-alike domains. Encourage staff to verify URLs and avoid “too-good-to-be-true” promotions or charity appeals. 


Strengthen bot and fraud detection.  Tune WAF and bot-management tools to catch automated login attempts, fake account creation, and credential stuffing. These attacks spike before Black Friday and often continue into January. 


Run a short holiday security awareness push before Black Friday—and repeat before Christmas.  Brief all staff, especially finance and customer service, on seasonal scams: gift-card fraud, fake charities, refund and invoice scams, malvertising, and holiday-themed phishing.  


Remember: personal security is corporate security.  BYOD, home shopping, and password reuse mean an employee’s compromise can quickly become your organization’s compromise. Keep the message simple: protect your accounts, protect your company. 

Don't forget to follow us for more cybersecurity advice, and visit us at www.LMGsecurity.com for tip sheets, blogs, and more advice!
Resources: 

RH-ISAC — 2025 Holiday Season Cyber Threat Trends: https://rhisac.org/press-release/holiday-threats-2025/ (RH-ISAC)
Malwarebytes — Home Depot Halloween phish gives users a fright, not a freebie: https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie (Malwarebytes)
Bitdefender Labs — Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes: https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds (Bitdefender)
FBI / IC3 PSA — Hacker Com: Cyber Criminal Subset of The Com — background on The Com threat cluster referenced by RH-ISAC and seen in holiday fraud activity: https://www.ic3.gov/PSA/2025/PSA250723 (Internet Crime Complaint Center)
Fast Company — Holiday season cybersecurity lessons: The vulnerability of the retail workforce: https://www.fastcompany.com/91270554/holiday-season-cybersecurity-lessons-the-vulnerability-of-the-retail-workforce (Fast Company) 

 #HolidayScams #Phishing #Malvertising #Cybersecurity #Cyberaware #SMB #BlackFridayScams]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>847</itunes:duration>
                <itunes:episode>46</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/8kwn873iagfpczk4/CSChats_4786lpn-uq6uch-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/d5ziisnck3s8wktb/CSChats_4786lpn-uq6uch-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>LOUVRE Was the Password?! Cybersecurity Lessons from the Heist</title>
        <itunes:title>LOUVRE Was the Password?! Cybersecurity Lessons from the Heist</itunes:title>
        <link>https://www.chatcyberside.com/e/louvre-heist-exposed-how-weak-tech-old-passwords-invited-the-theft/</link>
                    <comments>https://www.chatcyberside.com/e/louvre-heist-exposed-how-weak-tech-old-passwords-invited-the-theft/#comments</comments>        <pubDate>Tue, 11 Nov 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/52d21783-bcad-3563-8bfa-5c4c638ed5c8</guid>
                                    <description><![CDATA[<p>When thieves pulled off a lightning-fast heist at the Louvre on October 19, 2025, the world focused on the stolen jewels. But leaked audit reports soon revealed another story — one of weak passwords, legacy systems, and a decade of ignored warnings. </p>
<p>In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the cybersecurity lessons behind the Louvre’s seven-minute robbery. They explore how outdated infrastructure, poor vendor oversight, and default credentials mirror the same risks plaguing modern organizations — from hospitals to banks. </p>
<p>Listen as Sherri and Matt connect the dots between a world-famous museum and your own IT environment — and share practical steps to keep your organization from becoming the next headline. </p>
<p>Key Takeaways </p>
<ul>
<li>Audit for weak and shared passwords. Regularly scan for shared, default, or vendor credentials. Replace them with strong, unique, role-based passwords and enforce MFA across administrative and vendor accounts. </li>
</ul>
<ul>
<li>Conduct regular penetration tests and track remediation. Perform annual or semiannual pen tests that include internal movement and segmentation checks. Assign owners for every finding, set deadlines, and verify fixes. </li>
</ul>
<ul>
<li>Vet and contractually bind third-party vendors. Require patching and OS update clauses in vendor contracts, and verify each vendor’s security practices through audits or reports such as SOC 2. </li>
</ul>
<ul>
<li>Integrate IT and physical security. Coordinate teams so camera, badge, and alarm systems receive the same cybersecurity oversight as IT systems. Check for remote access exposure and outdated credentials. </li>
</ul>
<ul>
<li>Plan for legacy system containment. Identify unsupported systems, isolate them on segmented networks, and add compensating controls. Build a phased replacement roadmap tied to budget and risk. </li>
</ul>
<ul>
<li>Create a continuous audit and feedback loop. Assign clear ownership for all audit findings and track progress. Escalate unresolved risks to leadership to maintain visibility and accountability. </li>
</ul>
<ul>
<li>Control your media communications. Limit access to sensitive reports and train staff to prevent leaks. Manage breach-related communications strategically to protect reputation and trust. </li>
</ul>
<p>Don't forget to follow us for weekly expert cybersecurity insights on today's threats.</p>
<p>Resources </p>
<p><a href='https://www.liberation.fr/checknews/louvre-as-a-password-outdated-software-impossible-updates-ten-years-of-it-security-breaches-at-the-worlds-leading-museum-20251101_VG4OBZKSHBD6BJRLQTBFD25WOA/'>Libération / CheckNews – “Louvre as a password, outdated software, impossible updates…” (Nov. 1, 2025)</a> </p>
<p><a href='https://www.cnet.com/tech/you-probably-have-a-better-password-than-the-louvre-did-learn-from-its-mistake/'>CNET – “You probably have a better password than the Louvre did — learn from its mistake.” (Nov. 2025)</a> </p>
<p><a href='https://www.youtube.com/watch?v=NIGbQ9NHFEg'>YouTube – Hank Green interviews Sherri Davidoff on the Louvre Heist</a> </p>
<p><a href='https://www.scientificamerican.com/article/how-hackers-turned-cameras-into-crypto-miners/'>LMG Security – “How Hackers Turned Cameras into Crypto Miners” (Scientific American)</a> </p>
<p>#louvreheist #cybersecurity #cyberaware #password #infosec #ciso </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When thieves pulled off a lightning-fast heist at the Louvre on October 19, 2025, the world focused on the stolen jewels. But leaked audit reports soon revealed another story — one of weak passwords, legacy systems, and a decade of ignored warnings. </p>
<p>In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the cybersecurity lessons behind the Louvre’s seven-minute robbery. They explore how outdated infrastructure, poor vendor oversight, and default credentials mirror the same risks plaguing modern organizations — from hospitals to banks. </p>
<p>Listen as Sherri and Matt connect the dots between a world-famous museum and your own IT environment — and share practical steps to keep your organization from becoming the next headline. </p>
<p>Key Takeaways </p>
<ul>
<li>Audit for weak and shared passwords. Regularly scan for shared, default, or vendor credentials. Replace them with strong, unique, role-based passwords and enforce MFA across administrative and vendor accounts. </li>
</ul>
<ul>
<li>Conduct regular penetration tests and track remediation. Perform annual or semiannual pen tests that include internal movement and segmentation checks. Assign owners for every finding, set deadlines, and verify fixes. </li>
</ul>
<ul>
<li>Vet and contractually bind third-party vendors. Require patching and OS update clauses in vendor contracts, and verify each vendor’s security practices through audits or reports such as SOC 2. </li>
</ul>
<ul>
<li>Integrate IT and physical security. Coordinate teams so camera, badge, and alarm systems receive the same cybersecurity oversight as IT systems. Check for remote access exposure and outdated credentials. </li>
</ul>
<ul>
<li>Plan for legacy system containment. Identify unsupported systems, isolate them on segmented networks, and add compensating controls. Build a phased replacement roadmap tied to budget and risk. </li>
</ul>
<ul>
<li>Create a continuous audit and feedback loop. Assign clear ownership for all audit findings and track progress. Escalate unresolved risks to leadership to maintain visibility and accountability. </li>
</ul>
<ul>
<li>Control your media communications. Limit access to sensitive reports and train staff to prevent leaks. Manage breach-related communications strategically to protect reputation and trust. </li>
</ul>
<p>Don't forget to follow us for weekly expert cybersecurity insights on today's threats.</p>
<p>Resources </p>
<p><a href='https://www.liberation.fr/checknews/louvre-as-a-password-outdated-software-impossible-updates-ten-years-of-it-security-breaches-at-the-worlds-leading-museum-20251101_VG4OBZKSHBD6BJRLQTBFD25WOA/'>Libération / CheckNews – “Louvre as a password, outdated software, impossible updates…” (Nov. 1, 2025)</a> </p>
<p><a href='https://www.cnet.com/tech/you-probably-have-a-better-password-than-the-louvre-did-learn-from-its-mistake/'>CNET – “You probably have a better password than the Louvre did — learn from its mistake.” (Nov. 2025)</a> </p>
<p><a href='https://www.youtube.com/watch?v=NIGbQ9NHFEg'>YouTube – Hank Green interviews Sherri Davidoff on the Louvre Heist</a> </p>
<p><a href='https://www.scientificamerican.com/article/how-hackers-turned-cameras-into-crypto-miners/'>LMG Security – “How Hackers Turned Cameras into Crypto Miners” (Scientific American)</a> </p>
<p>#louvreheist #cybersecurity #cyberaware #password #infosec #ciso </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4x7z8wxr72rgcb6j/CSChats_45azu20-j57wra-Optimized.mp3" length="17779523" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When thieves pulled off a lightning-fast heist at the Louvre on October 19, 2025, the world focused on the stolen jewels. But leaked audit reports soon revealed another story — one of weak passwords, legacy systems, and a decade of ignored warnings. 
In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the cybersecurity lessons behind the Louvre’s seven-minute robbery. They explore how outdated infrastructure, poor vendor oversight, and default credentials mirror the same risks plaguing modern organizations — from hospitals to banks. 
Listen as Sherri and Matt connect the dots between a world-famous museum and your own IT environment — and share practical steps to keep your organization from becoming the next headline. 
Key Takeaways 

Audit for weak and shared passwords. Regularly scan for shared, default, or vendor credentials. Replace them with strong, unique, role-based passwords and enforce MFA across administrative and vendor accounts. 


Conduct regular penetration tests and track remediation. Perform annual or semiannual pen tests that include internal movement and segmentation checks. Assign owners for every finding, set deadlines, and verify fixes. 


Vet and contractually bind third-party vendors. Require patching and OS update clauses in vendor contracts, and verify each vendor’s security practices through audits or reports such as SOC 2. 


Integrate IT and physical security. Coordinate teams so camera, badge, and alarm systems receive the same cybersecurity oversight as IT systems. Check for remote access exposure and outdated credentials. 


Plan for legacy system containment. Identify unsupported systems, isolate them on segmented networks, and add compensating controls. Build a phased replacement roadmap tied to budget and risk. 


Create a continuous audit and feedback loop. Assign clear ownership for all audit findings and track progress. Escalate unresolved risks to leadership to maintain visibility and accountability. 


Control your media communications. Limit access to sensitive reports and train staff to prevent leaks. Manage breach-related communications strategically to protect reputation and trust. 

Don't forget to follow us for weekly expert cybersecurity insights on today's threats.
Resources 
Libération / CheckNews – “Louvre as a password, outdated software, impossible updates…” (Nov. 1, 2025) 
CNET – “You probably have a better password than the Louvre did — learn from its mistake.” (Nov. 2025) 
YouTube – Hank Green interviews Sherri Davidoff on the Louvre Heist 
LMG Security – “How Hackers Turned Cameras into Crypto Miners” (Scientific American) 
#louvreheist #cybersecurity #cyberaware #password #infosec #ciso ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1073</itunes:duration>
                <itunes:episode>45</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/wvmkt9tn698gpvta/CSChats_45azu20-j57wra-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/9c23hskvt6up8xxc/CSChats_45azu20-j57wra-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Poisoned Search: How Hackers Turn Google Results into Backdoors</title>
        <itunes:title>Poisoned Search: How Hackers Turn Google Results into Backdoors</itunes:title>
        <link>https://www.chatcyberside.com/e/search-results-are-the-new-phish-inside-seo-poisoning-attacks/</link>
                    <comments>https://www.chatcyberside.com/e/search-results-are-the-new-phish-inside-seo-poisoning-attacks/#comments</comments>        <pubDate>Tue, 04 Nov 2025 06:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/cd34667d-f301-3d41-ada2-0a4581c8551a</guid>
                                    <description><![CDATA[<p>Attackers are poisoning search results and buying sponsored ads to push malware disguised as trusted software. In this episode, Sherri Davidoff and Matt Durrin break down the latest SEO poisoning and malvertising research, including the Oyster/Broomstick campaign that hid backdoors inside fake Microsoft Teams installers. Learn how these attacks exploit everyday user behavior, why they’re so effective, and what your organization can do to stop them. </p>
<p>Whether you’re a security leader, risk manager, or seasoned IT pro, you’ll walk away with clear, practical steps to reduce exposure and strengthen your defenses against the poisoned web. </p>
<p> </p>
<p>KEY TAKEAWAYS  </p>
<ol>
<li>Block and filter ad content at the enterprise level. Use enterprise web proxies, browser controls, and DNS filtering to block sponsored results and malicious domains tied to critical business tools or portals.  </li>
<li>Establish and enforce trusted download paths. Require that all software come from signed, verified, or internal repositories — not search results.  Enforce application whitelisting so only verified executables can run — this blocks malicious installers even if a user downloads them. </li>
<li>Incorporate poisoned-search scenarios into training and awareness materials. Teach staff to type trusted URLs, use bookmarks, or access internal portals directly rather than searching. </li>
<li>Assess search behavior across your organization. Track how users find tools and portals — are they typing URLs, using bookmarks, or searching externally? Use this data to identify high-risk departments or roles and tailor awareness campaigns accordingly. Over time, shift culture toward safer, more deliberate browsing habits.  </li>
<li>Expand monitoring and detection. Hunt for persistence artifacts linked to poisoned-download infections, such as new scheduled tasks, DLL registrations, or rundll32.exe activity. Flag software installs originating from search-referral URLs in your EDR and SIEM. </li>
<li>Conduct tabletop exercises that include search poisoning. Simulate incidents where employees download fake software or fall for poisoned ads. Practice tracing attacks back to SEO poisoning, identifying other potential victims, and developing plans to block future attacks through technical and policy controls. </li>
</ol>
<p> Please like and subscribe for more cybersecurity content, and visit us at www.LMGsecurity.com if you need help with cybersecurity, training, testing, or policy development. </p>
<p>Resources &amp; References </p>
<ul>
<li>Blackpoint Cyber SOC: <a href='https://blackpointcyber.com/blog/malicious-teams-installers-drop-oyster-malware/'>Malicious Teams Installers Drop Oyster Malware</a> </li>
</ul>
<ul>
<li>BleepingComputer: <a href='https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/'>Fake Microsoft Teams Installers Push Oyster Malware via Malvertising</a> </li>
</ul>
<ul>
<li>Netskope: <a href='https://www.netskope.com/resources/cloud-threat-report/cloud-and-threat-report-2025'>Cloud &amp; Threat Report 2025</a> </li>
</ul>
<ul>
<li>Netskope Press Release: <a href='https://investors.netskope.com/news-releases/news-release-details/netskope-threat-labs-phishing-clicks-nearly-tripled-2024'>Phishing Clicks Nearly Tripled in 2024</a> </li>
</ul>
<ul>
<li>Malwarebytes: <a href='https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number'>Scammers Hijack Websites of Bank of America, Netflix, Microsoft, and More to Insert Fake Phone Numbers</a> </li>
</ul>
<ul>
<li>Silent Push: <a href='https://www.silentpush.com/blog/payroll-pirates/'>Payroll Pirates: How Attackers Hijack Employee Payments</a> </li>
</ul>
<ul>
<li>KnowBe4: <a href='https://blog.knowbe4.com/phishing-attacks-hijack-employee-payments'>Phishing Attacks Hijack Employee Payments</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>Attackers are poisoning search results and buying sponsored ads to push malware disguised as trusted software. In this episode, Sherri Davidoff and Matt Durrin break down the latest SEO poisoning and malvertising research, including the <em>Oyster/Broomstick</em> campaign that hid backdoors inside fake Microsoft Teams installers. Learn how these attacks exploit everyday user behavior, why they’re so effective, and what your organization can do to stop them. </p>
<p>Whether you’re a security leader, risk manager, or seasoned IT pro, you’ll walk away with clear, practical steps to reduce exposure and strengthen your defenses against the poisoned web. </p>
<p> </p>
<p>KEY TAKEAWAYS  </p>
<ol>
<li>Block and filter ad content at the enterprise level. Use enterprise web proxies, browser controls, and DNS filtering to block sponsored results and malicious domains tied to critical business tools or portals.  </li>
<li>Establish and enforce trusted download paths. Require that all software come from signed, verified, or internal repositories — not search results.  Enforce application whitelisting so only verified executables can run — this blocks malicious installers even if a user downloads them. </li>
<li>Incorporate poisoned-search scenarios into training and awareness materials. Teach staff to type trusted URLs, use bookmarks, or access internal portals directly rather than searching. </li>
<li>Assess search behavior across your organization. Track how users find tools and portals — are they typing URLs, using bookmarks, or searching externally? Use this data to identify high-risk departments or roles and tailor awareness campaigns accordingly. Over time, shift culture toward safer, more deliberate browsing habits.  </li>
<li>Expand monitoring and detection. Hunt for persistence artifacts linked to poisoned-download infections, such as new scheduled tasks, DLL registrations, or rundll32.exe activity. Flag software installs originating from search-referral URLs in your EDR and SIEM. </li>
<li>Conduct tabletop exercises that include search poisoning. Simulate incidents where employees download fake software or fall for poisoned ads. Practice tracing attacks back to SEO poisoning, identifying other potential victims, and developing plans to block future attacks through technical and policy controls. </li>
</ol>
<p> Please like and subscribe for more cybersecurity content, and visit us at www.LMGsecurity.com if you need help with cybersecurity, training, testing, or policy development. </p>
<p>Resources &amp; References </p>
<ul>
<li>Blackpoint Cyber SOC: <a href='https://blackpointcyber.com/blog/malicious-teams-installers-drop-oyster-malware/'><em>Malicious Teams Installers Drop Oyster Malware</em></a> </li>
</ul>
<ul>
<li>BleepingComputer: <a href='https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/'><em>Fake Microsoft Teams Installers Push Oyster Malware via Malvertising</em></a> </li>
</ul>
<ul>
<li>Netskope: <a href='https://www.netskope.com/resources/cloud-threat-report/cloud-and-threat-report-2025'><em>Cloud &amp; Threat Report 2025</em></a> </li>
</ul>
<ul>
<li>Netskope Press Release: <a href='https://investors.netskope.com/news-releases/news-release-details/netskope-threat-labs-phishing-clicks-nearly-tripled-2024'><em>Phishing Clicks Nearly Tripled in 2024</em></a> </li>
</ul>
<ul>
<li>Malwarebytes: <a href='https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number'><em>Scammers Hijack Websites of Bank of America, Netflix, Microsoft, and More to Insert Fake Phone Numbers</em></a> </li>
</ul>
<ul>
<li>Silent Push: <a href='https://www.silentpush.com/blog/payroll-pirates/'><em>Payroll Pirates: How Attackers Hijack Employee Payments</em></a> </li>
</ul>
<ul>
<li>KnowBe4: <a href='https://blog.knowbe4.com/phishing-attacks-hijack-employee-payments'><em>Phishing Attacks Hijack Employee Payments</em></a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5ua4imu8qxzybfaf/CSChats_447ee8k-kzxc96-Optimized.mp3" length="20936933" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Attackers are poisoning search results and buying sponsored ads to push malware disguised as trusted software. In this episode, Sherri Davidoff and Matt Durrin break down the latest SEO poisoning and malvertising research, including the Oyster/Broomstick campaign that hid backdoors inside fake Microsoft Teams installers. Learn how these attacks exploit everyday user behavior, why they’re so effective, and what your organization can do to stop them. 
Whether you’re a security leader, risk manager, or seasoned IT pro, you’ll walk away with clear, practical steps to reduce exposure and strengthen your defenses against the poisoned web. 
 
KEY TAKEAWAYS  

Block and filter ad content at the enterprise level. Use enterprise web proxies, browser controls, and DNS filtering to block sponsored results and malicious domains tied to critical business tools or portals.  
Establish and enforce trusted download paths. Require that all software come from signed, verified, or internal repositories — not search results.  Enforce application whitelisting so only verified executables can run — this blocks malicious installers even if a user downloads them. 
Incorporate poisoned-search scenarios into training and awareness materials. Teach staff to type trusted URLs, use bookmarks, or access internal portals directly rather than searching. 
Assess search behavior across your organization. Track how users find tools and portals — are they typing URLs, using bookmarks, or searching externally? Use this data to identify high-risk departments or roles and tailor awareness campaigns accordingly. Over time, shift culture toward safer, more deliberate browsing habits.  
Expand monitoring and detection. Hunt for persistence artifacts linked to poisoned-download infections, such as new scheduled tasks, DLL registrations, or rundll32.exe activity. Flag software installs originating from search-referral URLs in your EDR and SIEM. 
Conduct tabletop exercises that include search poisoning. Simulate incidents where employees download fake software or fall for poisoned ads. Practice tracing attacks back to SEO poisoning, identifying other potential victims, and developing plans to block future attacks through technical and policy controls. 

 Please like and subscribe for more cybersecurity content, and visit us at www.LMGsecurity.com if you need help with cybersecurity, training, testing, or policy development. 
Resources &amp; References 

Blackpoint Cyber SOC: Malicious Teams Installers Drop Oyster Malware 


BleepingComputer: Fake Microsoft Teams Installers Push Oyster Malware via Malvertising 


Netskope: Cloud &amp; Threat Report 2025 


Netskope Press Release: Phishing Clicks Nearly Tripled in 2024 


Malwarebytes: Scammers Hijack Websites of Bank of America, Netflix, Microsoft, and More to Insert Fake Phone Numbers 


Silent Push: Payroll Pirates: How Attackers Hijack Employee Payments 


KnowBe4: Phishing Attacks Hijack Employee Payments 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1270</itunes:duration>
                <itunes:episode>44</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/kfiz7biu5jfp22wa/CSChats_447ee8k-kzxc96-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/rvs8cgxqrakuc4p2/CSChats_447ee8k-kzxc96-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The AWS Outage and Hidden Fourth-Party Risks</title>
        <itunes:title>The AWS Outage and Hidden Fourth-Party Risks</itunes:title>
        <link>https://www.chatcyberside.com/e/when-the-cloud-crashed-inside-the-aws-outage-that-broke-the-internet/</link>
                    <comments>https://www.chatcyberside.com/e/when-the-cloud-crashed-inside-the-aws-outage-that-broke-the-internet/#comments</comments>        <pubDate>Tue, 28 Oct 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/b3165da1-ccec-3877-aedf-052e03dd717b</guid>
                                    <description><![CDATA[<p>When Amazon Web Services went down on October 20, 2025, the impact rippled around the world. The outage knocked out Slack messages, paused financial trades, grounded flights, and even stopped people from charging their electric cars. From Coinbase to college classrooms, from food delivery apps to smart homes, millions discovered just how deeply their lives depend on a single cloud provider. </p>
<p>In this episode, Sherri Davidoff and Matt Durrin break down what really happened inside AWS’s U.S.-East-1 region, why one glitch in a database called DynamoDB cascaded across the globe, and what it teaches us about the growing risk from invisible “fourth-party” dependencies that lurk deep in our digital supply chains. </p>
<p>Key Takeaways </p>
<ol>
<li>Map and monitor your vendor ecosystem — Identify both third- and fourth-party dependencies and track their health. </li>
<li>Require vendors to disclose key dependencies — Request a “digital bill of materials” that identifies their critical cloud and service providers. </li>
<li>Diversify critical workloads — Don’t rely on a single hyperscaler region or platform for mission-critical services. </li>
<li>Integrate vendor outages into incident response playbooks — Treat SaaS and cloud downtime as security events with defined response paths. </li>
<li>Test your resilience under real-world conditions — Simulate large-scale SaaS or cloud failures in tabletop exercises. </li>
</ol>
<p>Resources: </p>
<ul>
<li><a href='https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet'>https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet</a> </li>
</ul>
<ul>
<li><a href='https://www.LMGsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>https://www.LMGsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/ </a></li>
</ul>
<ul>
<li><a href='https://www.pandasecurity.com/en/mediacenter/aws-outage-cybersecurity-risk/'>https://www.pandasecurity.com/en/mediacenter/aws-outage-cybersecurity-risk/</a> </li>
</ul>
<ul>
<li><a href='https://ccianet.org/wp-content/uploads/2003/09/cyberinsecurity%20the%20cost%20of%20monopoly.pdf'>https://ccianet.org/wp-content/uploads/2003/09/cyberinsecurity%20the%20cost%20of%20monopoly.pdf</a></li>
</ul>
<p>#cybersecurity #thirdpartyrisk #riskmanagement #infosec #ciso #cyberaware #Fourthpartyrisk #cybersidechats #lmgsecurity #aws #awsoutage</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When Amazon Web Services went down on October 20, 2025, the impact rippled around the world. The outage knocked out Slack messages, paused financial trades, grounded flights, and even stopped people from charging their electric cars. From Coinbase to college classrooms, from food delivery apps to smart homes, millions discovered just how deeply their lives depend on a single cloud provider. </p>
<p>In this episode, Sherri Davidoff and Matt Durrin break down what really happened inside AWS’s U.S.-East-1 region, why one glitch in a database called DynamoDB cascaded across the globe, and what it teaches us about the growing risk from invisible “fourth-party” dependencies that lurk deep in our digital supply chains. </p>
<p>Key Takeaways </p>
<ol>
<li>Map and monitor your vendor ecosystem — Identify both third- and fourth-party dependencies and track their health. </li>
<li>Require vendors to disclose key dependencies — Request a “digital bill of materials” that identifies their critical cloud and service providers. </li>
<li>Diversify critical workloads — Don’t rely on a single hyperscaler region or platform for mission-critical services. </li>
<li>Integrate vendor outages into incident response playbooks — Treat SaaS and cloud downtime as security events with defined response paths. </li>
<li>Test your resilience under real-world conditions — Simulate large-scale SaaS or cloud failures in tabletop exercises. </li>
</ol>
<p>Resources: </p>
<ul>
<li><a href='https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet'>https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet</a> </li>
</ul>
<ul>
<li><a href='https://www.LMGsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>https://www.LMGsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/ </a></li>
</ul>
<ul>
<li><a href='https://www.pandasecurity.com/en/mediacenter/aws-outage-cybersecurity-risk/'>https://www.pandasecurity.com/en/mediacenter/aws-outage-cybersecurity-risk/</a> </li>
</ul>
<ul>
<li><a href='https://ccianet.org/wp-content/uploads/2003/09/cyberinsecurity%20the%20cost%20of%20monopoly.pdf'>https://ccianet.org/wp-content/uploads/2003/09/cyberinsecurity%20the%20cost%20of%20monopoly.pdf</a></li>
</ul>
<p>#cybersecurity #thirdpartyrisk #riskmanagement #infosec #ciso #cyberaware #Fourthpartyrisk #cybersidechats #lmgsecurity #aws #awsoutage</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3mnw9srq3wu3kce7/CSChats_43bessb-rbsygb-Optimized.mp3" length="14619359" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When Amazon Web Services went down on October 20, 2025, the impact rippled around the world. The outage knocked out Slack messages, paused financial trades, grounded flights, and even stopped people from charging their electric cars. From Coinbase to college classrooms, from food delivery apps to smart homes, millions discovered just how deeply their lives depend on a single cloud provider. 
In this episode, Sherri Davidoff and Matt Durrin break down what really happened inside AWS’s U.S.-East-1 region, why one glitch in a database called DynamoDB cascaded across the globe, and what it teaches us about the growing risk from invisible “fourth-party” dependencies that lurk deep in our digital supply chains. 
Key Takeaways 

Map and monitor your vendor ecosystem — Identify both third- and fourth-party dependencies and track their health. 
Require vendors to disclose key dependencies — Request a “digital bill of materials” that identifies their critical cloud and service providers. 
Diversify critical workloads — Don’t rely on a single hyperscaler region or platform for mission-critical services. 
Integrate vendor outages into incident response playbooks — Treat SaaS and cloud downtime as security events with defined response paths. 
Test your resilience under real-world conditions — Simulate large-scale SaaS or cloud failures in tabletop exercises. 

Resources: 

https://www.wired.com/story/what-that-huge-aws-outage-reveals-about-the-internet 


https://www.LMGsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/ 


https://www.pandasecurity.com/en/mediacenter/aws-outage-cybersecurity-risk/ 


https://ccianet.org/wp-content/uploads/2003/09/cyberinsecurity%20the%20cost%20of%20monopoly.pdf

#cybersecurity #thirdpartyrisk #riskmanagement #infosec #ciso #cyberaware #Fourthpartyrisk #cybersidechats #lmgsecurity #aws #awsoutage]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>876</itunes:duration>
                <itunes:episode>43</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/dgp8vy457qi45zyn/CSChats_43bessb-rbsygb-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/b2b9wk7zycfiadyd/CSChats_43bessb-rbsygb-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack</title>
        <itunes:title>Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack</itunes:title>
        <link>https://www.chatcyberside.com/e/manufacturing-under-siege-jaguar-land-rovers-six-week-shutdown-and-supply-chain-fallout/</link>
                    <comments>https://www.chatcyberside.com/e/manufacturing-under-siege-jaguar-land-rovers-six-week-shutdown-and-supply-chain-fallout/#comments</comments>        <pubDate>Tue, 21 Oct 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/353137b5-57ec-3cb9-aa94-47525ed9cca0</guid>
                                    <description><![CDATA[<p>When ransomware forced Jaguar Land Rover to halt production for six weeks, the impact rippled through global supply chains — from luxury car lines to small suppliers fighting to stay afloat. In this episode, Sherri Davidoff and Matt Durrin examine what happened, why manufacturing has become ransomware’s top target, and what new data from Sophos and Black Kite reveal about the latest attack trends. </p>
<p>They share practical insights on how organizations can strengthen resilience, secure supply chains, and prepare for the next wave of operational ransomware attacks. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Patch and prioritize. 
 Focus on fixing known exploited vulnerabilities (CISA KEV) and critical  flaws before attackers do. </li>
</ol>
<ol>
<li>Monitor your vendors continuously. 
 Move beyond annual questionnaires — use ongoing, data-driven monitoring to identify risk in your supply chain. </li>
</ol>
<ol>
<li>Segment IT and OT networks. 
 Strong isolation can contain ransomware and prevent complete production shutdowns. </li>
</ol>
<ol>
<li>Invest in detection and response. 
 Around-the-clock monitoring (MDR or SOC) can detect early-stage activity before encryption starts. </li>
</ol>
<ol>
<li>Practice recovery. 
 Test isolation, backup, and restoration processes regularly — and include your leadership team in realistic tabletop exercises. </li>
</ol>
<p> </p>
<p>References &amp; Further Reading </p>
<ul>
<li><a href='https://www.sophos.com/en-us/content/state-of-ransomware'>Sophos – State of Ransomware 2025 (June 2025</a>) </li>
</ul>
<ul>
<li><a href='https://content.blackkite.com/ebook/manufacturing-tprm-report-2025'>Black Kite – Manufacturing TPRM Report 2025</a> </li>
</ul>
<ul>
<li><a href='https://www.theguardian.com/business/2025/sep/20/jaguar-land-rover-hack-factories-cybersecurity-jlr'>The Guardian – “Jaguar Land Rover Hack Shuts Factories After Cyberattack”</a> </li>
</ul>
<ul>
<li><a href='https://www.reuters.com/business/jlr-restart-some-manufacturing-operations-wednesday-2025-10-07/'>Reuters – “JLR to Restart Some Manufacturing After Six-Week Shutdown”</a> </li>
</ul>
<ul>
<li><a href='https://www.darkreading.com/ics-ot-security/ransomware-manufacturing-an-escalating-battle'>Dark Reading – Ransomware in Manufacturing: An Escalating Battle</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/resources/ransomware-prevention-best-practices-checklist/'>LMG Security – Ransomware Prevention Best Practices Checklist</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>When ransomware forced Jaguar Land Rover to halt production for six weeks, the impact rippled through global supply chains — from luxury car lines to small suppliers fighting to stay afloat. In this episode, Sherri Davidoff and Matt Durrin examine what happened, why manufacturing has become ransomware’s top target, and what new data from Sophos and Black Kite reveal about the latest attack trends. </p>
<p>They share practical insights on how organizations can strengthen resilience, secure supply chains, and prepare for the next wave of operational ransomware attacks. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Patch and prioritize. <br>
 Focus on fixing known exploited vulnerabilities (CISA KEV) and critical  flaws before attackers do. </li>
</ol>
<ol>
<li>Monitor your vendors continuously. <br>
 Move beyond annual questionnaires — use ongoing, data-driven monitoring to identify risk in your supply chain. </li>
</ol>
<ol>
<li>Segment IT and OT networks. <br>
 Strong isolation can contain ransomware and prevent complete production shutdowns. </li>
</ol>
<ol>
<li>Invest in detection and response. <br>
 Around-the-clock monitoring (MDR or SOC) can detect early-stage activity before encryption starts. </li>
</ol>
<ol>
<li>Practice recovery. <br>
 Test isolation, backup, and restoration processes regularly — and include your leadership team in realistic tabletop exercises. </li>
</ol>
<p> </p>
<p>References &amp; Further Reading </p>
<ul>
<li><a href='https://www.sophos.com/en-us/content/state-of-ransomware'>Sophos – State of Ransomware 2025 (June 2025</a>) </li>
</ul>
<ul>
<li><a href='https://content.blackkite.com/ebook/manufacturing-tprm-report-2025'>Black Kite – Manufacturing TPRM Report 2025</a> </li>
</ul>
<ul>
<li><a href='https://www.theguardian.com/business/2025/sep/20/jaguar-land-rover-hack-factories-cybersecurity-jlr'>The Guardian – “Jaguar Land Rover Hack Shuts Factories After Cyberattack”</a> </li>
</ul>
<ul>
<li><a href='https://www.reuters.com/business/jlr-restart-some-manufacturing-operations-wednesday-2025-10-07/'>Reuters – “JLR to Restart Some Manufacturing After Six-Week Shutdown”</a> </li>
</ul>
<ul>
<li><a href='https://www.darkreading.com/ics-ot-security/ransomware-manufacturing-an-escalating-battle'>Dark Reading – Ransomware in Manufacturing: An Escalating Battle</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/resources/ransomware-prevention-best-practices-checklist/'>LMG Security – Ransomware Prevention Best Practices Checklist</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kpqmpyjztfg2qp8b/CSChats_427v21l-r832ag-Optimized.mp3" length="22140349" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When ransomware forced Jaguar Land Rover to halt production for six weeks, the impact rippled through global supply chains — from luxury car lines to small suppliers fighting to stay afloat. In this episode, Sherri Davidoff and Matt Durrin examine what happened, why manufacturing has become ransomware’s top target, and what new data from Sophos and Black Kite reveal about the latest attack trends. 
They share practical insights on how organizations can strengthen resilience, secure supply chains, and prepare for the next wave of operational ransomware attacks. 
 
Key Takeaways 

Patch and prioritize.  Focus on fixing known exploited vulnerabilities (CISA KEV) and critical  flaws before attackers do. 


Monitor your vendors continuously.  Move beyond annual questionnaires — use ongoing, data-driven monitoring to identify risk in your supply chain. 


Segment IT and OT networks.  Strong isolation can contain ransomware and prevent complete production shutdowns. 


Invest in detection and response.  Around-the-clock monitoring (MDR or SOC) can detect early-stage activity before encryption starts. 


Practice recovery.  Test isolation, backup, and restoration processes regularly — and include your leadership team in realistic tabletop exercises. 

 
References &amp; Further Reading 

Sophos – State of Ransomware 2025 (June 2025) 


Black Kite – Manufacturing TPRM Report 2025 


The Guardian – “Jaguar Land Rover Hack Shuts Factories After Cyberattack” 


Reuters – “JLR to Restart Some Manufacturing After Six-Week Shutdown” 


Dark Reading – Ransomware in Manufacturing: An Escalating Battle 


LMG Security – Ransomware Prevention Best Practices Checklist 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1177</itunes:duration>
                <itunes:episode>42</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/ustdxqt6etqhiysx/CSChats_427v21l-r832ag-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/x8k53er8a2ngfvt2/CSChats_427v21l-r832ag-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Power of “Why” – Communicating Cybersecurity Effectively</title>
        <itunes:title>The Power of “Why” – Communicating Cybersecurity Effectively</itunes:title>
        <link>https://www.chatcyberside.com/e/lead-with-why-transforming-cybersecurity-training-with-storytelling/</link>
                    <comments>https://www.chatcyberside.com/e/lead-with-why-transforming-cybersecurity-training-with-storytelling/#comments</comments>        <pubDate>Tue, 14 Oct 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/ec762ce2-363d-359f-9aef-65dc2f28c2cc</guid>
                                    <description><![CDATA[<p>In this episode of Cyberside Chats, Matt Durrin and his guest explore what makes cybersecurity communication effective — whether you’re leading a sales presentation, a training session, or a tabletop exercise. The discussion dives into how to move beyond technical jargon and statistics to tell stories that resonate. Listeners will learn how understanding and communicating the “why” behind security practices can dramatically improve engagement, retention, and impact across any audience.</p>
<p> </p>
<p>Top Takeaways</p>
<ul>
<li>Lead With Why: Start with impact and consequences before discussing tools or features.</li>
<li>Use Stories, Not Just Stats: Connect technical points to human experiences that make the message memorable.</li>
<li>Run the “So What?” Test: Always link facts and advice to why they matter for that specific audience.</li>
<li>Balance Fear With Agency: Create urgency without hopelessness — show clear, achievable actions.</li>
<li>Mix Communication Methods: Blend stories, visuals, simulations, and discussion to sustain engagement.</li>
<li>Communication is a Security Control: If people don’t understand why something matters, adoption and compliance will suffer.</li>
</ul>
<p>#cybersecurity #cyberawareness #cyberaware #training #technicaltraining #ciso #cybersecuritytraining #CybersideChats #LMGsecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of <em>Cyberside Chats</em>, Matt Durrin and his guest explore what makes cybersecurity communication effective — whether you’re leading a sales presentation, a training session, or a tabletop exercise. The discussion dives into how to move beyond technical jargon and statistics to tell stories that resonate. Listeners will learn how understanding and communicating the <em>“why”</em> behind security practices can dramatically improve engagement, retention, and impact across any audience.</p>
<p> </p>
<p>Top Takeaways</p>
<ul>
<li>Lead With Why: Start with impact and consequences before discussing tools or features.</li>
<li>Use Stories, Not Just Stats: Connect technical points to human experiences that make the message memorable.</li>
<li>Run the “So What?” Test: Always link facts and advice to why they matter for that specific audience.</li>
<li>Balance Fear With Agency: Create urgency without hopelessness — show clear, achievable actions.</li>
<li>Mix Communication Methods: Blend stories, visuals, simulations, and discussion to sustain engagement.</li>
<li>Communication is a Security Control: If people don’t understand <em>why</em> something matters, adoption and compliance will suffer.</li>
</ul>
<p>#cybersecurity #cyberawareness #cyberaware #training #technicaltraining #ciso #cybersecuritytraining #CybersideChats #LMGsecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/t2xcbu5wyu75vp6h/CSChats_419fsv6-ug4478-Optimized.mp3" length="26578382" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyberside Chats, Matt Durrin and his guest explore what makes cybersecurity communication effective — whether you’re leading a sales presentation, a training session, or a tabletop exercise. The discussion dives into how to move beyond technical jargon and statistics to tell stories that resonate. Listeners will learn how understanding and communicating the “why” behind security practices can dramatically improve engagement, retention, and impact across any audience.
 
Top Takeaways

Lead With Why: Start with impact and consequences before discussing tools or features.
Use Stories, Not Just Stats: Connect technical points to human experiences that make the message memorable.
Run the “So What?” Test: Always link facts and advice to why they matter for that specific audience.
Balance Fear With Agency: Create urgency without hopelessness — show clear, achievable actions.
Mix Communication Methods: Blend stories, visuals, simulations, and discussion to sustain engagement.
Communication is a Security Control: If people don’t understand why something matters, adoption and compliance will suffer.

#cybersecurity #cyberawareness #cyberaware #training #technicaltraining #ciso #cybersecuritytraining #CybersideChats #LMGsecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1454</itunes:duration>
                <itunes:episode>41</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/7pviimb4x66hke4u/CSChats_419fsv6-ug4478-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/9986sj7dx9sg3iri/CSChats_419fsv6-ug4478-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Shutdown Fallout: The Cybersecurity Information Sharing Act Expires</title>
        <itunes:title>Shutdown Fallout: The Cybersecurity Information Sharing Act Expires</itunes:title>
        <link>https://www.chatcyberside.com/e/when-cisa-goes-silent-the-risk-of-losing-cyber-threat-intel/</link>
                    <comments>https://www.chatcyberside.com/e/when-cisa-goes-silent-the-risk-of-losing-cyber-threat-intel/#comments</comments>        <pubDate>Tue, 07 Oct 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/67dcbbe2-85ce-3a27-89a3-87956f8f0127</guid>
                                    <description><![CDATA[<p>When the government shut down, the Cybersecurity Information Sharing Act of 2015 expired with it. That law provided liability protections for cyber threat information sharing and underpinned DHS’s Automated Indicator Sharing (AIS) program, which costs about $1M a month to run. Is it worth the cost? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the value of public-private information sharing, the uncertain future of AIS, and how cybersecurity leaders should adapt as visibility gaps emerge. Along the way, they share a real-world story of how information sharing stopped a ransomware attack in its tracks — and what could happen if those pipelines dry up. </p>
<p>Key Takeaways: </p>
<ul>
<li>Strengthen threat intelligence pipelines: Don’t rely solely on AIS or your vendor. Ask providers how they source threat intel and diversify feeds. </li>
</ul>
<ul>
<li>Review liability exposure: With CISA expired, safe harbors are gone — consult counsel before sharing. </li>
</ul>
<ul>
<li>Plan for reduced visibility: Run tabletop exercises simulating loss of upstream intel. </li>
</ul>
<ul>
<li>Get proactive about information exchange: Join ISACs, ISAOs, or local peer groups — and contribute, not just consume. </li>
</ul>
<p>Resources: </p>
<ul>
<li>Reuters: <a href='https://www.reuters.com/legal/litigation/industry-groups-worry-about-cyber-info-sharing-key-us-law-is-set-expire-2025-09-29/'>Industry groups worry about cyber info-sharing as key U.S. law set to expire</a> </li>
</ul>
<ul>
<li>U.S. Chamber of Commerce: <a href='https://www.uschamber.com/security/letter-to-congress-on-the-cybersecurity-information-sharing-act-of-2015'>Letter to Congress on CISA 2015</a> </li>
</ul>
<ul>
<li>Baker McKenzie: <a href='https://connectontech.bakermckenzie.com/cisa-liability-protections-terminate-what-legal-infosec-need-to-know-before-sharing-cyber-threat-information/'>CISA Liability Protections Terminate — What Legal &amp; Infosec Need to Know</a> </li>
</ul>
<ul>
<li>Cyberside Chats: <a href='https://www.chatcyberside.com/e/executive-order-shockwave-the-future-of-cybersecurity-unveiled/'>Executive Order Shockwave: The Future of Cybersecurity Unveiled</a> </li>
</ul>
<p>#CybersideChats #CISA #CISO #cybersecurity #infosec</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When the government shut down, the Cybersecurity Information Sharing Act of 2015 expired with it. That law provided liability protections for cyber threat information sharing and underpinned DHS’s Automated Indicator Sharing (AIS) program, which costs about $1M a month to run. Is it worth the cost? In this episode of <em>Cyberside Chats</em>, Sherri Davidoff and Matt Durrin dig into the value of public-private information sharing, the uncertain future of AIS, and how cybersecurity leaders should adapt as visibility gaps emerge. Along the way, they share a real-world story of how information sharing stopped a ransomware attack in its tracks — and what could happen if those pipelines dry up. </p>
<p>Key Takeaways: </p>
<ul>
<li>Strengthen threat intelligence pipelines: Don’t rely solely on AIS or your vendor. Ask providers how they source threat intel and diversify feeds. </li>
</ul>
<ul>
<li>Review liability exposure: With CISA expired, safe harbors are gone — consult counsel before sharing. </li>
</ul>
<ul>
<li>Plan for reduced visibility: Run tabletop exercises simulating loss of upstream intel. </li>
</ul>
<ul>
<li>Get proactive about information exchange: Join ISACs, ISAOs, or local peer groups — and contribute, not just consume. </li>
</ul>
<p>Resources: </p>
<ul>
<li>Reuters: <a href='https://www.reuters.com/legal/litigation/industry-groups-worry-about-cyber-info-sharing-key-us-law-is-set-expire-2025-09-29/'>Industry groups worry about cyber info-sharing as key U.S. law set to expire</a> </li>
</ul>
<ul>
<li>U.S. Chamber of Commerce: <a href='https://www.uschamber.com/security/letter-to-congress-on-the-cybersecurity-information-sharing-act-of-2015'>Letter to Congress on CISA 2015</a> </li>
</ul>
<ul>
<li>Baker McKenzie: <a href='https://connectontech.bakermckenzie.com/cisa-liability-protections-terminate-what-legal-infosec-need-to-know-before-sharing-cyber-threat-information/'>CISA Liability Protections Terminate — What Legal &amp; Infosec Need to Know</a> </li>
</ul>
<ul>
<li>Cyberside Chats: <a href='https://www.chatcyberside.com/e/executive-order-shockwave-the-future-of-cybersecurity-unveiled/'>Executive Order Shockwave: The Future of Cybersecurity Unveiled</a> </li>
</ul>
<p>#CybersideChats #CISA #CISO #cybersecurity #infosec</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hbtektvig4rhpfvv/CSChats_40brqlf-ujjqf5-Optimized.mp3" length="17257340" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When the government shut down, the Cybersecurity Information Sharing Act of 2015 expired with it. That law provided liability protections for cyber threat information sharing and underpinned DHS’s Automated Indicator Sharing (AIS) program, which costs about $1M a month to run. Is it worth the cost? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the value of public-private information sharing, the uncertain future of AIS, and how cybersecurity leaders should adapt as visibility gaps emerge. Along the way, they share a real-world story of how information sharing stopped a ransomware attack in its tracks — and what could happen if those pipelines dry up. 
Key Takeaways: 

Strengthen threat intelligence pipelines: Don’t rely solely on AIS or your vendor. Ask providers how they source threat intel and diversify feeds. 


Review liability exposure: With CISA expired, safe harbors are gone — consult counsel before sharing. 


Plan for reduced visibility: Run tabletop exercises simulating loss of upstream intel. 


Get proactive about information exchange: Join ISACs, ISAOs, or local peer groups — and contribute, not just consume. 

Resources: 

Reuters: Industry groups worry about cyber info-sharing as key U.S. law set to expire 


U.S. Chamber of Commerce: Letter to Congress on CISA 2015 


Baker McKenzie: CISA Liability Protections Terminate — What Legal &amp; Infosec Need to Know 


Cyberside Chats: Executive Order Shockwave: The Future of Cybersecurity Unveiled 

#CybersideChats #CISA #CISO #cybersecurity #infosec]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1041</itunes:duration>
                <itunes:episode>40</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/dgi38v3caztp6rc6/CSChats_40brqlf-ujjqf5-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/hd9iuekit5nb6tdn/CSChats_40brqlf-ujjqf5-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Inside the Spider’s Web: What Indictments Reveal About Scattered Spider</title>
        <itunes:title>Inside the Spider’s Web: What Indictments Reveal About Scattered Spider</itunes:title>
        <link>https://www.chatcyberside.com/e/inside-scattered-spider-how-teen-hackers-and-crypto-trails-brought-down-a-global-ransom-network/</link>
                    <comments>https://www.chatcyberside.com/e/inside-scattered-spider-how-teen-hackers-and-crypto-trails-brought-down-a-global-ransom-network/#comments</comments>        <pubDate>Tue, 30 Sep 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/602b7f09-f802-366f-9811-5e19552dc183</guid>
                                    <description><![CDATA[<p>Scattered Spider is back in the headlines, with two recent arrests — Thalha Jubair in the UK and a teenager in Nevada — bringing fresh attention to one of the most disruptive cybercriminal crews today. But the real story is in the indictments: they offer a rare inside look at the group’s structure, their victims, and the mistakes that led law enforcement to track them down. In this episode, Sherri Davidoff and Matt Durrin break down what the indictments reveal about Scattered Spider’s tactics, roles, and evolution, and what defenders can learn from these cases. </p>
<p>Key Takeaways: </p>
<ul>
<li>Lock down your help desk. Require strong, multi-step verification before resetting accounts, and monitor for suspicious or unusual requests. </li>
</ul>
<ul>
<li>Prepare for ransom decisions. Develop playbooks that model both paying and refusing, so leadership understands the financial and operational tradeoffs before an incident hits. </li>
</ul>
<ul>
<li>Get proactive on insider risk. Teens and early-career workers are being recruited in open forums like Telegram and Discord — build awareness and detection into your insider risk program. </li>
</ul>
<ul>
<li>Pressure-test your MFA. Don’t just roll it out — simulate how attackers might bypass or trick staff into resetting it. </li>
</ul>
<ul>
<li>Educate your team on voice social engineering. Scattered Spider relied on phone-based tactics; training staff to recognize and resist them is critical. (LMG Security offers targeted social engineering training to help your team prepare.) </li>
</ul>
<p>Resources: </p>
<ul>
<li>BleepingComputer: “US charges UK teen over Scattered Spider hacks including US Courts” <a href='https://www.bleepingcomputer.com/news/security/uk-arrests-scattered-spider-teens-linked-to-transport-for-london-hack/'>https://www.bleepingcomputer.com/news/security/uk-arrests-scattered-spider-teens-linked-to-transport-for-london-hack/</a> </li>
</ul>
<ul>
<li>“The Rabbit Hole Beneath the Crypto Couple is Endless” <a href='https://www.vice.com/en/article/the-rabbithole-beneath-the-crypto-couple-is-endless'>https://www.vice.com/en/article/the-rabbithole-beneath-the-crypto-couple-is-endless</a> </li>
</ul>
<ul>
<li>MGM Breach: A Wake-up Call for Better Social Engineering Training for Employees <a href='https://www.lmgsecurity.com/2023-mgm-breach-a-wake-up-call-for-better-social-engineering-training-for-employees/'>https://www.lmgsecurity.com/2023-mgm-breach-a-wake-up-call-for-better-social-engineering-training-for-employees/</a> </li>
</ul>
<ul>
<li>DOJ press release on the indictment of five Scattered Spider members (Nov 2024) – <a href='https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text'>https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text</a>  </li>
</ul>
<ul>
<li>DOJ press release on UK national Thalha Jubair charged in multiple attacks (Sept 2025) – <a href='https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical'>https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical</a>  </li>
</ul>
<p>#cyberattack #cybersecurity #cybercrime #informationsecurity #infosec #databreach #databreaches #ScatteredSpider </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Scattered Spider is back in the headlines, with two recent arrests — Thalha Jubair in the UK and a teenager in Nevada — bringing fresh attention to one of the most disruptive cybercriminal crews today. But the real story is in the indictments: they offer a rare inside look at the group’s structure, their victims, and the mistakes that led law enforcement to track them down. In this episode, Sherri Davidoff and Matt Durrin break down what the indictments reveal about Scattered Spider’s tactics, roles, and evolution, and what defenders can learn from these cases. </p>
<p>Key Takeaways: </p>
<ul>
<li>Lock down your help desk. Require strong, multi-step verification before resetting accounts, and monitor for suspicious or unusual requests. </li>
</ul>
<ul>
<li>Prepare for ransom decisions. Develop playbooks that model both paying and refusing, so leadership understands the financial and operational tradeoffs before an incident hits. </li>
</ul>
<ul>
<li>Get proactive on insider risk. Teens and early-career workers are being recruited in open forums like Telegram and Discord — build awareness and detection into your insider risk program. </li>
</ul>
<ul>
<li>Pressure-test your MFA. Don’t just roll it out — simulate how attackers might bypass or trick staff into resetting it. </li>
</ul>
<ul>
<li>Educate your team on voice social engineering. Scattered Spider relied on phone-based tactics; training staff to recognize and resist them is critical. <em>(LMG Security offers targeted social engineering training to help your team prepare.)</em> </li>
</ul>
<p>Resources: </p>
<ul>
<li><em>BleepingComputer:</em> “US charges UK teen over Scattered Spider hacks including US Courts” <a href='https://www.bleepingcomputer.com/news/security/uk-arrests-scattered-spider-teens-linked-to-transport-for-london-hack/'>https://www.bleepingcomputer.com/news/security/uk-arrests-scattered-spider-teens-linked-to-transport-for-london-hack/</a> </li>
</ul>
<ul>
<li>“The Rabbit Hole Beneath the Crypto Couple is Endless” <a href='https://www.vice.com/en/article/the-rabbithole-beneath-the-crypto-couple-is-endless'>https://www.vice.com/en/article/the-rabbithole-beneath-the-crypto-couple-is-endless</a> </li>
</ul>
<ul>
<li>MGM Breach: A Wake-up Call for Better Social Engineering Training for Employees <a href='https://www.lmgsecurity.com/2023-mgm-breach-a-wake-up-call-for-better-social-engineering-training-for-employees/'>https://www.lmgsecurity.com/2023-mgm-breach-a-wake-up-call-for-better-social-engineering-training-for-employees/</a> </li>
</ul>
<ul>
<li>DOJ press release on the indictment of five Scattered Spider members (Nov 2024) – <a href='https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text'>https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text</a>  </li>
</ul>
<ul>
<li>DOJ press release on UK national Thalha Jubair charged in multiple attacks (Sept 2025) – <a href='https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical'>https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical</a>  </li>
</ul>
<p>#cyberattack #cybersecurity #cybercrime #informationsecurity #infosec #databreach #databreaches #ScatteredSpider </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/g974sziawmymwux8/CSChats_39bu918-sn8rda-Optimized.mp3" length="21945435" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Scattered Spider is back in the headlines, with two recent arrests — Thalha Jubair in the UK and a teenager in Nevada — bringing fresh attention to one of the most disruptive cybercriminal crews today. But the real story is in the indictments: they offer a rare inside look at the group’s structure, their victims, and the mistakes that led law enforcement to track them down. In this episode, Sherri Davidoff and Matt Durrin break down what the indictments reveal about Scattered Spider’s tactics, roles, and evolution, and what defenders can learn from these cases. 
Key Takeaways: 

Lock down your help desk. Require strong, multi-step verification before resetting accounts, and monitor for suspicious or unusual requests. 


Prepare for ransom decisions. Develop playbooks that model both paying and refusing, so leadership understands the financial and operational tradeoffs before an incident hits. 


Get proactive on insider risk. Teens and early-career workers are being recruited in open forums like Telegram and Discord — build awareness and detection into your insider risk program. 


Pressure-test your MFA. Don’t just roll it out — simulate how attackers might bypass or trick staff into resetting it. 


Educate your team on voice social engineering. Scattered Spider relied on phone-based tactics; training staff to recognize and resist them is critical. (LMG Security offers targeted social engineering training to help your team prepare.) 

Resources: 

BleepingComputer: “US charges UK teen over Scattered Spider hacks including US Courts” https://www.bleepingcomputer.com/news/security/uk-arrests-scattered-spider-teens-linked-to-transport-for-london-hack/ 


“The Rabbit Hole Beneath the Crypto Couple is Endless” https://www.vice.com/en/article/the-rabbithole-beneath-the-crypto-couple-is-endless 


MGM Breach: A Wake-up Call for Better Social Engineering Training for Employees https://www.lmgsecurity.com/2023-mgm-breach-a-wake-up-call-for-better-social-engineering-training-for-employees/ 


DOJ press release on the indictment of five Scattered Spider members (Nov 2024) – https://www.justice.gov/usao-cdca/pr/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text  


DOJ press release on UK national Thalha Jubair charged in multiple attacks (Sept 2025) – https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical  

#cyberattack #cybersecurity #cybercrime #informationsecurity #infosec #databreach #databreaches #ScatteredSpider ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1165</itunes:duration>
                <itunes:episode>39</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/gvxc7tpxkectg2ku/CSChats_39bu918-sn8rda-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/a8gvrgphymej7rk6/CSChats_39bu918-sn8rda-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Vibe Hacking: The Dark Side of AI Coding</title>
        <itunes:title>Vibe Hacking: The Dark Side of AI Coding</itunes:title>
        <link>https://www.chatcyberside.com/e/vibe-hacking-exposed-how-ai-turns-coding-into-cybercrime/</link>
                    <comments>https://www.chatcyberside.com/e/vibe-hacking-exposed-how-ai-turns-coding-into-cybercrime/#comments</comments>        <pubDate>Tue, 23 Sep 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/f6893725-1238-3318-8f8b-42d47bf5c212</guid>
                                    <description><![CDATA[<p>What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the future of security. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Establish ground rules for AI use  
<ul>
<li>Even if you don’t have developers, employees may experiment with AI tools. Set a policy for how (or if) AI can be used for coding, automation, or day-to-day tasks.  </li>
<li>Make sure staff understand not to paste sensitive data (like credentials or customer info) into AI tools. </li>
</ul>
</li>
<li>Strengthen your software supply chain  
<ul>
<li>If you rely on vendors or contractors, ask them whether they use AI in their development process and how they vet the resulting code.  </li>
<li>Request (or create) an inventory of software components and dependencies (SBOMs) so you know what’s inside the software you buy.  </li>
<li>Stay alert to supply chain risks from open-source code or third-party add-ons. </li>
</ul>
</li>
<li>Treat your endpoints like crown jewels  
<ul>
<li>Limit what software employees can install, especially IT staff.  </li>
<li>Provide a safe “sandbox” machine for testing unfamiliar tools instead of using production systems. </li>
<li>Apply strong endpoint protection and restrict administrative privileges. </li>
</ul>
</li>
<li>Prepare for AI-related incidents  
<ul>
<li>Include scenarios where AI is part of the attack, such as compromised development tools, malicious packages, or data fed into rogue AI systems.  </li>
<li>Plan for vendor incidents, since third-party software providers may be the first link in a compromise.  </li>
<li>Test these scenarios through tabletop exercises so your team knows how to respond. </li>
</ul>
</li>
</ol>
<p>References </p>
<ul>
<li>Malwarebytes — Claude AI chatbot abused to launch cybercrime spree (Aug 2025): <a href='https://www.malwarebytes.com/blog/news/2025/08/claude-ai-chatbot-abused-to-launch-cybercrime-spree'>https://www.malwarebytes.com/blog/news/2025/08/claude-ai-chatbot-abused-to-launch-cybercrime-spree</a> </li>
</ul>
<ul>
<li>Trend Micro / Industrial Cyber — EvilAI malware campaign exploits AI-generated code to breach global critical sectors (Aug 2025): <a href='https://industrialcyber.co/ransomware/evilai-malware-campaign-exploits-ai-generated-code-to-breach-global-critical-sectors/'>https://industrialcyber.co/ransomware/evilai-malware-campaign-exploits-ai-generated-code-to-breach-global-critical-sectors/</a> </li>
</ul>
<ul>
<li>The Hacker News — Cursor AI code editor flaw enables silent code execution on developer systems (Sept 2025): <a href='https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables.html'>https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables.html</a> </li>
</ul>
<ul>
<li>PCWorld — I saw how an “evil” AI chatbot finds vulnerabilities. It’s as scary as you think (May 2025): <a href='https://www.pcworld.com/article/2424205/i-saw-how-an-evil-ai-chatbot-finds-vulnerabilities-its-as-scary-as-you-think.html'>https://www.pcworld.com/article/2424205/i-saw-how-an-evil-ai-chatbot-finds-vulnerabilities-its-as-scary-as-you-think.html</a> </li>
</ul>
<p>#AIhacking #AIcoding #vibehacking #vibecoding #cyberattack #cybersecurity #infosec #informationsecurity #datasecurity </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of <em>Cyberside Chats Live</em>, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the future of security. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Establish ground rules for AI use  
<ul>
<li>Even if you don’t have developers, employees may experiment with AI tools. Set a policy for how (or if) AI can be used for coding, automation, or day-to-day tasks.  </li>
<li>Make sure staff understand not to paste sensitive data (like credentials or customer info) into AI tools. </li>
</ul>
</li>
<li>Strengthen your software supply chain  
<ul>
<li>If you rely on vendors or contractors, ask them whether they use AI in their development process and how they vet the resulting code.  </li>
<li>Request (or create) an inventory of software components and dependencies (SBOMs) so you know what’s inside the software you buy.  </li>
<li>Stay alert to supply chain risks from open-source code or third-party add-ons. </li>
</ul>
</li>
<li>Treat your endpoints like crown jewels  
<ul>
<li>Limit what software employees can install, especially IT staff.  </li>
<li>Provide a safe “sandbox” machine for testing unfamiliar tools instead of using production systems. </li>
<li>Apply strong endpoint protection and restrict administrative privileges. </li>
</ul>
</li>
<li>Prepare for AI-related incidents  
<ul>
<li>Include scenarios where AI is part of the attack, such as compromised development tools, malicious packages, or data fed into rogue AI systems.  </li>
<li>Plan for vendor incidents, since third-party software providers may be the first link in a compromise.  </li>
<li>Test these scenarios through tabletop exercises so your team knows how to respond. </li>
</ul>
</li>
</ol>
<p>References </p>
<ul>
<li>Malwarebytes — <em>Claude AI chatbot abused to launch cybercrime spree</em> (Aug 2025): <a href='https://www.malwarebytes.com/blog/news/2025/08/claude-ai-chatbot-abused-to-launch-cybercrime-spree'>https://www.malwarebytes.com/blog/news/2025/08/claude-ai-chatbot-abused-to-launch-cybercrime-spree</a> </li>
</ul>
<ul>
<li>Trend Micro / Industrial Cyber — <em>EvilAI malware campaign exploits AI-generated code to breach global critical sectors</em> (Aug 2025): <a href='https://industrialcyber.co/ransomware/evilai-malware-campaign-exploits-ai-generated-code-to-breach-global-critical-sectors/'>https://industrialcyber.co/ransomware/evilai-malware-campaign-exploits-ai-generated-code-to-breach-global-critical-sectors/</a> </li>
</ul>
<ul>
<li>The Hacker News — <em>Cursor AI code editor flaw enables silent code execution on developer systems</em> (Sept 2025): <a href='https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables.html'>https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables.html</a> </li>
</ul>
<ul>
<li>PCWorld — <em>I saw how an “evil” AI chatbot finds vulnerabilities. It’s as scary as you think</em> (May 2025): <a href='https://www.pcworld.com/article/2424205/i-saw-how-an-evil-ai-chatbot-finds-vulnerabilities-its-as-scary-as-you-think.html'>https://www.pcworld.com/article/2424205/i-saw-how-an-evil-ai-chatbot-finds-vulnerabilities-its-as-scary-as-you-think.html</a> </li>
</ul>
<p>#AIhacking #AIcoding #vibehacking #vibecoding #cyberattack #cybersecurity #infosec #informationsecurity #datasecurity </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/s3xcajczjc8nx36q/CSChats_389g54u-yr9xr8-Optimized.mp3" length="27286500" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the future of security. 
 
Key Takeaways 

Establish ground rules for AI use  

Even if you don’t have developers, employees may experiment with AI tools. Set a policy for how (or if) AI can be used for coding, automation, or day-to-day tasks.  
Make sure staff understand not to paste sensitive data (like credentials or customer info) into AI tools. 


Strengthen your software supply chain  

If you rely on vendors or contractors, ask them whether they use AI in their development process and how they vet the resulting code.  
Request (or create) an inventory of software components and dependencies (SBOMs) so you know what’s inside the software you buy.  
Stay alert to supply chain risks from open-source code or third-party add-ons. 


Treat your endpoints like crown jewels  

Limit what software employees can install, especially IT staff.  
Provide a safe “sandbox” machine for testing unfamiliar tools instead of using production systems. 
Apply strong endpoint protection and restrict administrative privileges. 


Prepare for AI-related incidents  

Include scenarios where AI is part of the attack, such as compromised development tools, malicious packages, or data fed into rogue AI systems.  
Plan for vendor incidents, since third-party software providers may be the first link in a compromise.  
Test these scenarios through tabletop exercises so your team knows how to respond. 



References 

Malwarebytes — Claude AI chatbot abused to launch cybercrime spree (Aug 2025): https://www.malwarebytes.com/blog/news/2025/08/claude-ai-chatbot-abused-to-launch-cybercrime-spree 


Trend Micro / Industrial Cyber — EvilAI malware campaign exploits AI-generated code to breach global critical sectors (Aug 2025): https://industrialcyber.co/ransomware/evilai-malware-campaign-exploits-ai-generated-code-to-breach-global-critical-sectors/ 


The Hacker News — Cursor AI code editor flaw enables silent code execution on developer systems (Sept 2025): https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables.html 


PCWorld — I saw how an “evil” AI chatbot finds vulnerabilities. It’s as scary as you think (May 2025): https://www.pcworld.com/article/2424205/i-saw-how-an-evil-ai-chatbot-finds-vulnerabilities-its-as-scary-as-you-think.html 

#AIhacking #AIcoding #vibehacking #vibecoding #cyberattack #cybersecurity #infosec #informationsecurity #datasecurity ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1667</itunes:duration>
                <itunes:episode>38</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/bmxyj5g853p7tiec/CSChats_389g54u-yr9xr8-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/dy3p9arevjbqaen9/CSChats_389g54u-yr9xr8-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Saga Continues: More Dirt on the Salesforce–Drift Breach</title>
        <itunes:title>The Saga Continues: More Dirt on the Salesforce–Drift Breach</itunes:title>
        <link>https://www.chatcyberside.com/e/massive-drift-salesforce-breach-one-compromised-github-account-sparks-a-700-company-fallout/</link>
                    <comments>https://www.chatcyberside.com/e/massive-drift-salesforce-breach-one-compromised-github-account-sparks-a-700-company-fallout/#comments</comments>        <pubDate>Tue, 16 Sep 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/d5b36450-3481-38a0-b93e-e25915786e63</guid>
                                    <description><![CDATA[<p>When we first covered the Salesforce–Drift breach, we knew it was bad. Now it’s clear the impact is even bigger. Hundreds of organizations — including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, Rubrik, and even financial firms like Wealthsimple — have confirmed they were affected. The root cause? A compromised GitHub account that opened the door to Drift’s AWS environment and gave attackers access to Salesforce and other cloud integrations. </p>
<p>In Part 2, Sherri Davidoff and Matt Durrin dig into the latest updates: what’s new in the investigation, why more victim disclosures are coming, and how the GitHub compromise ties into a wider trend of supply chain attacks like GhostAction. They also share practical advice for what to do if you’ve been impacted by Drift — or if you want to prepare for the next third-party SaaS compromise. </p>
<p>Tips for SaaS Incident Response: </p>
<ol>
<li>Treat this as an incident: don’t wait for vendor confirmation before acting. There may be delays in vendor disclosure, so act quickly. </li>
<li>Notify your cyber insurance provider: 
<ul>
<li>Provide notice as soon as possible. </li>
<li>Insurers may share early IOCs, coordinate with vendors, and advocate for your org alongside other affected clients. </li>
<li>They can also connect you with funded IR and legal resources. </li>
</ul>
</li>
<li>Engage external support: 
<ul>
<li>Bring in your IR firm to investigate and document. </li>
<li>Work with legal counsel to determine if notification obligations are triggered. </li>
</ul>
</li>
<li>Revoke and rotate credentials: 
<ul>
<li>Cycle API keys, OAuth tokens, and active sessions. </li>
<li>Rotate credentials for connected service accounts. </li>
</ul>
</li>
<li>Inventory your data: 
<ul>
<li>Identify what sensitive Salesforce (or other SaaS) data is stored. </li>
<li>Check whether support tickets, logs, or credentials were included. </li>
</ul>
</li>
<li>Search for attacker activity: 
<ul>
<li>Review advisories for malicious IPs, user agents, and behaviors. </li>
<li>Don’t rely solely on vendor-published IOCs — they may be incomplete. </li>
</ul>
</li>
</ol>
<p> </p>
<p>References: </p>
<ul>
<li><a href='https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift'>Google Cloud Threat Intelligence Blog – Data theft in Salesforce instances via Salesloft Drift</a> </li>
</ul>
<ul>
<li><a href='https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/'>BleepingComputer – Salesloft March GitHub repo breach led to Salesforce data theft attacks</a> </li>
</ul>
<ul>
<li><a href='https://www.darkreading.com/cyberattacks-data-breaches/salesloft-breached-github-account-compromise'>Dark Reading – Salesloft breached GitHub account compromise</a> </li>
</ul>
<ul>
<li><a href='https://www.bleepingcomputer.com/news/security/hackers-steal-3-325-secrets-in-ghostaction-github-supply-chain-attack/'>BleepingComputer – Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>LMG Security Blog – Third-Party Risk Management Lessons</a> </li>
</ul>
<p>#salesforcehack #salesforce #SalesforceDrift #cybersecurity #cyberattack #databreaches #datasecurity #infosec #informationsecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When we first covered the Salesforce–Drift breach, we knew it was bad. Now it’s clear the impact is even bigger. Hundreds of organizations — including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, Rubrik, and even financial firms like Wealthsimple — have confirmed they were affected. The root cause? A compromised GitHub account that opened the door to Drift’s AWS environment and gave attackers access to Salesforce and other cloud integrations. </p>
<p>In Part 2, Sherri Davidoff and Matt Durrin dig into the latest updates: what’s new in the investigation, why more victim disclosures are coming, and how the GitHub compromise ties into a wider trend of supply chain attacks like GhostAction. They also share practical advice for what to do if you’ve been impacted by Drift — or if you want to prepare for the next third-party SaaS compromise. </p>
<p>Tips for SaaS Incident Response: </p>
<ol>
<li>Treat this as an incident: don’t wait for vendor confirmation before acting. There may be delays in vendor disclosure, so act quickly. </li>
<li>Notify your cyber insurance provider: 
<ul>
<li>Provide notice as soon as possible. </li>
<li>Insurers may share early IOCs, coordinate with vendors, and advocate for your org alongside other affected clients. </li>
<li>They can also connect you with funded IR and legal resources. </li>
</ul>
</li>
<li>Engage external support: 
<ul>
<li>Bring in your IR firm to investigate and document. </li>
<li>Work with legal counsel to determine if notification obligations are triggered. </li>
</ul>
</li>
<li>Revoke and rotate credentials: 
<ul>
<li>Cycle API keys, OAuth tokens, and active sessions. </li>
<li>Rotate credentials for connected service accounts. </li>
</ul>
</li>
<li>Inventory your data: 
<ul>
<li>Identify what sensitive Salesforce (or other SaaS) data is stored. </li>
<li>Check whether support tickets, logs, or credentials were included. </li>
</ul>
</li>
<li>Search for attacker activity: 
<ul>
<li>Review advisories for malicious IPs, user agents, and behaviors. </li>
<li>Don’t rely solely on vendor-published IOCs — they may be incomplete. </li>
</ul>
</li>
</ol>
<p> </p>
<p>References: </p>
<ul>
<li><a href='https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift'>Google Cloud Threat Intelligence Blog – Data theft in Salesforce instances via Salesloft Drift</a> </li>
</ul>
<ul>
<li><a href='https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/'>BleepingComputer – Salesloft March GitHub repo breach led to Salesforce data theft attacks</a> </li>
</ul>
<ul>
<li><a href='https://www.darkreading.com/cyberattacks-data-breaches/salesloft-breached-github-account-compromise'>Dark Reading – Salesloft breached GitHub account compromise</a> </li>
</ul>
<ul>
<li><a href='https://www.bleepingcomputer.com/news/security/hackers-steal-3-325-secrets-in-ghostaction-github-supply-chain-attack/'>BleepingComputer – Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>LMG Security Blog – Third-Party Risk Management Lessons</a> </li>
</ul>
<p>#salesforcehack #salesforce #SalesforceDrift #cybersecurity #cyberattack #databreaches #datasecurity #infosec #informationsecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/d9gx6mgg9462y587/CSChats_379yldf-ggv6dm-Optimized.mp3" length="19607158" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When we first covered the Salesforce–Drift breach, we knew it was bad. Now it’s clear the impact is even bigger. Hundreds of organizations — including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, Rubrik, and even financial firms like Wealthsimple — have confirmed they were affected. The root cause? A compromised GitHub account that opened the door to Drift’s AWS environment and gave attackers access to Salesforce and other cloud integrations. 
In Part 2, Sherri Davidoff and Matt Durrin dig into the latest updates: what’s new in the investigation, why more victim disclosures are coming, and how the GitHub compromise ties into a wider trend of supply chain attacks like GhostAction. They also share practical advice for what to do if you’ve been impacted by Drift — or if you want to prepare for the next third-party SaaS compromise. 
Tips for SaaS Incident Response: 

Treat this as an incident: don’t wait for vendor confirmation before acting. There may be delays in vendor disclosure, so act quickly. 
Notify your cyber insurance provider: 

Provide notice as soon as possible. 
Insurers may share early IOCs, coordinate with vendors, and advocate for your org alongside other affected clients. 
They can also connect you with funded IR and legal resources. 


Engage external support: 

Bring in your IR firm to investigate and document. 
Work with legal counsel to determine if notification obligations are triggered. 


Revoke and rotate credentials: 

Cycle API keys, OAuth tokens, and active sessions. 
Rotate credentials for connected service accounts. 


Inventory your data: 

Identify what sensitive Salesforce (or other SaaS) data is stored. 
Check whether support tickets, logs, or credentials were included. 


Search for attacker activity: 

Review advisories for malicious IPs, user agents, and behaviors. 
Don’t rely solely on vendor-published IOCs — they may be incomplete. 



 
References: 

Google Cloud Threat Intelligence Blog – Data theft in Salesforce instances via Salesloft Drift 


BleepingComputer – Salesloft March GitHub repo breach led to Salesforce data theft attacks 


Dark Reading – Salesloft breached GitHub account compromise 


BleepingComputer – Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack 


LMG Security Blog – Third-Party Risk Management Lessons 

#salesforcehack #salesforce #SalesforceDrift #cybersecurity #cyberattack #databreaches #datasecurity #infosec #informationsecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1018</itunes:duration>
                <itunes:episode>37</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/ihbk8tje4dymd56h/CSChats_379yldf-ggv6dm-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/izzyyq6j7dnn5ae5/CSChats_379yldf-ggv6dm-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Connected App, Connected Risk: The Salesforce–Drift Incident</title>
        <itunes:title>Connected App, Connected Risk: The Salesforce–Drift Incident</itunes:title>
        <link>https://www.chatcyberside.com/e/how-a-stolen-oauth-token-enabled-a-mass-supply-chain-breach/</link>
                    <comments>https://www.chatcyberside.com/e/how-a-stolen-oauth-token-enabled-a-mass-supply-chain-breach/#comments</comments>        <pubDate>Tue, 09 Sep 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/0a351b3e-ed63-39c4-9851-01f837c44365</guid>
                                    <description><![CDATA[<p>A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the Salesforce–Drift breach: how OAuth tokens became skeleton keys, why media headlines about billions of Gmail users were wrong, and what organizations need to do to protect themselves from similar supply chain attacks. </p>
<p>Key Takeaways </p>
<ul>
<li>Ensure Vendors Conduct Rigorous Technical Security Testing – Require penetration tests and attestations from third- and fourth-party SaaS providers. </li>
</ul>
<ul>
<li>Limit App Permissions to “Least Privilege” – Scope connected apps only to the fields and objects they truly need. </li>
</ul>
<ul>
<li>Implement Regular Key Rotation – Automate key rotation with vendor tools (e.g., AWS recommends every 60–90 days) to reduce the risk of leaked or stolen keys. </li>
</ul>
<ul>
<li>Monitor for Data Exfiltration – Watch for unusual queries, spikes in API usage, or large Bulk API jobs. </li>
</ul>
<ul>
<li>Limit Data Exfiltration Destinations – Restrict where exports and API jobs can go (approved IPs or managed locations). </li>
</ul>
<ul>
<li>Integrate SaaS Risks into Your Incident Response Plan – Include guidance on rapidly revoking or rotating OAuth tokens and keys after a compromise. </li>
</ul>
<p> </p>
<p>References </p>
<ol>
<li><a href='https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift'>Google Threat Intelligence Group advisory on UNC6395 / Drift OAuth compromise</a> </li>
<li><a href='https://blog.cloudflare.com/response-to-salesloft-drift-incident/'>Cloudflare disclosure on the Drift incident</a> </li>
<li><a href='https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response'>Zscaler security advisory on Drift-related Salesforce breach</a> </li>
<li><a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>LMG Security Blog – Third-Party Risk Management Lessons</a> </li>
</ol>
<p>#Salesforcehack #SalesforceDrift #cybersecurity #cyberattack #cyberaware</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the Salesforce–Drift breach: how OAuth tokens became skeleton keys, why media headlines about billions of Gmail users were wrong, and what organizations need to do to protect themselves from similar supply chain attacks. </p>
<p>Key Takeaways </p>
<ul>
<li>Ensure Vendors Conduct Rigorous Technical Security Testing – Require penetration tests and attestations from third- and fourth-party SaaS providers. </li>
</ul>
<ul>
<li>Limit App Permissions to “Least Privilege” – Scope connected apps only to the fields and objects they truly need. </li>
</ul>
<ul>
<li>Implement Regular Key Rotation – Automate key rotation with vendor tools (e.g., AWS recommends every 60–90 days) to reduce the risk of leaked or stolen keys. </li>
</ul>
<ul>
<li>Monitor for Data Exfiltration – Watch for unusual queries, spikes in API usage, or large Bulk API jobs. </li>
</ul>
<ul>
<li>Limit Data Exfiltration Destinations – Restrict where exports and API jobs can go (approved IPs or managed locations). </li>
</ul>
<ul>
<li>Integrate SaaS Risks into Your Incident Response Plan – Include guidance on rapidly revoking or rotating OAuth tokens and keys after a compromise. </li>
</ul>
<p> </p>
<p>References </p>
<ol>
<li><a href='https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift'>Google Threat Intelligence Group advisory on UNC6395 / Drift OAuth compromise</a> </li>
<li><a href='https://blog.cloudflare.com/response-to-salesloft-drift-incident/'>Cloudflare disclosure on the Drift incident</a> </li>
<li><a href='https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response'>Zscaler security advisory on Drift-related Salesforce breach</a> </li>
<li><a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>LMG Security Blog – Third-Party Risk Management Lessons</a> </li>
</ol>
<p>#Salesforcehack #SalesforceDrift #cybersecurity #cyberattack #cyberaware</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mqpizrwvn27bwcij/CSChats_36bh04i-bpyd38-Optimized.mp3" length="13950386" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the Salesforce–Drift breach: how OAuth tokens became skeleton keys, why media headlines about billions of Gmail users were wrong, and what organizations need to do to protect themselves from similar supply chain attacks. 
Key Takeaways 

Ensure Vendors Conduct Rigorous Technical Security Testing – Require penetration tests and attestations from third- and fourth-party SaaS providers. 


Limit App Permissions to “Least Privilege” – Scope connected apps only to the fields and objects they truly need. 


Implement Regular Key Rotation – Automate key rotation with vendor tools (e.g., AWS recommends every 60–90 days) to reduce the risk of leaked or stolen keys. 


Monitor for Data Exfiltration – Watch for unusual queries, spikes in API usage, or large Bulk API jobs. 


Limit Data Exfiltration Destinations – Restrict where exports and API jobs can go (approved IPs or managed locations). 


Integrate SaaS Risks into Your Incident Response Plan – Include guidance on rapidly revoking or rotating OAuth tokens and keys after a compromise. 

 
References 

Google Threat Intelligence Group advisory on UNC6395 / Drift OAuth compromise 
Cloudflare disclosure on the Drift incident 
Zscaler security advisory on Drift-related Salesforce breach 
LMG Security Blog – Third-Party Risk Management Lessons 

#Salesforcehack #SalesforceDrift #cybersecurity #cyberattack #cyberaware]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>834</itunes:duration>
                <itunes:episode>36</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/a9jvr9q9qtqzrp99/CSChats_36bh04i-bpyd38-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/ppekdks37646ybbe/CSChats_36bh04i-bpyd38-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Betrayal, Backdoors, and Payback: When Hackers Become the Hacked</title>
        <itunes:title>Betrayal, Backdoors, and Payback: When Hackers Become the Hacked</itunes:title>
        <link>https://www.chatcyberside.com/e/cyber-privateers-is-hacking-back-about-to-become-legal/</link>
                    <comments>https://www.chatcyberside.com/e/cyber-privateers-is-hacking-back-about-to-become-legal/#comments</comments>        <pubDate>Tue, 02 Sep 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/8ff89a94-1829-351f-89a8-4bc2897834b5</guid>
                                    <description><![CDATA[<p>Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and rival leaks, the underground is full of double-crosses and takedowns. Now, Congress is even debating whether to bring back “letters of marque” to authorize cyber privateers to hack back on behalf of the United States. Join LMG Security’s Sherri Davidoff and Matt Durrin for a fast-paced discussion of headline cases, the lessons defenders can learn from these leaks, and what the future of hacker-on-hacker warfare could mean for your organization. </p>
<p>Key Takeaways   </p>
<ol>
<li>Don’t mythologize adversaries. State actors and ransomware gangs are fallible; design defenses to exploit their mistakes.  </li>
<li>Invest in visibility. Many hacker exposures happened because attackers reused credentials, tools, or infrastructure — the same patterns defenders can detect if monitoring is strong.  </li>
<li>Watch for insider threats. Disgruntled employees or partners can dismantle even powerful groups — monitor for early warning signs.  </li>
<li>Use leaks for training and education. Incorporate hacker chat logs, playbooks, and leaked toolkits into exercises to build staff skills and awareness.  </li>
<li>Adapt your IR playbooks. Align response plans with real-world attacker tactics revealed in leaks — and be ready to update as new intelligence emerges.  </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://techcrunch.com/2025/08/12/hackers-breach-and-expose-a-major-north-korean-spying-operation/'>TechCrunch: Hackers Breach and Expose a Major North Korean Spying Operation</a> </li>
<li>TheRegister: <a href='https://www.theregister.com/2025/08/21/congressman_proposes_bringing_back_letters/'>Congressman proposes bringing back letters of marque for cyber privateers</a> </li>
<li>LMG Security: <a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage'>Our Q3 2024 Top Control is Third-Party Risk Management</a> </li>
</ul>
<p>#Cybersecurity #Cybercrime #CybersideChats #Cyberattack #Hackers #Hacker </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and rival leaks, the underground is full of double-crosses and takedowns. Now, Congress is even debating whether to bring back “letters of marque” to authorize <em>cyber privateers</em> to hack back on behalf of the United States. Join LMG Security’s Sherri Davidoff and Matt Durrin for a fast-paced discussion of headline cases, the lessons defenders can learn from these leaks, and what the future of hacker-on-hacker warfare could mean for your organization. </p>
<p>Key Takeaways   </p>
<ol>
<li>Don’t mythologize adversaries. State actors and ransomware gangs are fallible; design defenses to exploit their mistakes.  </li>
<li>Invest in visibility. Many hacker exposures happened because attackers reused credentials, tools, or infrastructure — the same patterns defenders can detect if monitoring is strong.  </li>
<li>Watch for insider threats. Disgruntled employees or partners can dismantle even powerful groups — monitor for early warning signs.  </li>
<li>Use leaks for training and education. Incorporate hacker chat logs, playbooks, and leaked toolkits into exercises to build staff skills and awareness.  </li>
<li>Adapt your IR playbooks. Align response plans with real-world attacker tactics revealed in leaks — and be ready to update as new intelligence emerges.  </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://techcrunch.com/2025/08/12/hackers-breach-and-expose-a-major-north-korean-spying-operation/'>TechCrunch: Hackers Breach and Expose a Major North Korean Spying Operation</a> </li>
<li>TheRegister: <a href='https://www.theregister.com/2025/08/21/congressman_proposes_bringing_back_letters/'>Congressman proposes bringing back letters of marque for cyber privateers</a> </li>
<li>LMG Security: <a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage'>Our Q3 2024 Top Control is Third-Party Risk Management</a> </li>
</ul>
<p>#Cybersecurity #Cybercrime #CybersideChats #Cyberattack #Hackers #Hacker </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9mn3hd8wz2d3y67a/CSChats_35aymgd-r23c2d-Optimized.mp3" length="31021367" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and rival leaks, the underground is full of double-crosses and takedowns. Now, Congress is even debating whether to bring back “letters of marque” to authorize cyber privateers to hack back on behalf of the United States. Join LMG Security’s Sherri Davidoff and Matt Durrin for a fast-paced discussion of headline cases, the lessons defenders can learn from these leaks, and what the future of hacker-on-hacker warfare could mean for your organization. 
Key Takeaways   

Don’t mythologize adversaries. State actors and ransomware gangs are fallible; design defenses to exploit their mistakes.  
Invest in visibility. Many hacker exposures happened because attackers reused credentials, tools, or infrastructure — the same patterns defenders can detect if monitoring is strong.  
Watch for insider threats. Disgruntled employees or partners can dismantle even powerful groups — monitor for early warning signs.  
Use leaks for training and education. Incorporate hacker chat logs, playbooks, and leaked toolkits into exercises to build staff skills and awareness.  
Adapt your IR playbooks. Align response plans with real-world attacker tactics revealed in leaks — and be ready to update as new intelligence emerges.  

Resources 

TechCrunch: Hackers Breach and Expose a Major North Korean Spying Operation 
TheRegister: Congressman proposes bringing back letters of marque for cyber privateers 
LMG Security: Our Q3 2024 Top Control is Third-Party Risk Management 

#Cybersecurity #Cybercrime #CybersideChats #Cyberattack #Hackers #Hacker ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1731</itunes:duration>
                <itunes:episode>35</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/n8rk3yfx8ynuncwn/CSChats_35aymgd-r23c2d-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/i9frzgyfdini54xu/CSChats_35aymgd-r23c2d-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Printer Problems: Trump, Putin, and a Costly Mistake</title>
        <itunes:title>Printer Problems: Trump, Putin, and a Costly Mistake</itunes:title>
        <link>https://www.chatcyberside.com/e/printer-problems-trump-putin-and-a-costly-mistake/</link>
                    <comments>https://www.chatcyberside.com/e/printer-problems-trump-putin-and-a-costly-mistake/#comments</comments>        <pubDate>Tue, 26 Aug 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/f125e592-bb8b-31a8-ab01-c8b8a69aaa93</guid>
                                    <description><![CDATA[<p>On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. </p>
<p>But the real story isn’t just about geopolitics. It’s about how unmanaged printers—at hotels, in home offices, and everywhere in between—remain one of the most overlooked backdoors for data leaks. In this episode of Cyberside Chats, Sherri and Matt unpack the Alaska incident, explore why printers are still a weak spot in the age of remote and traveling workforces, and share practical steps to secure them. </p>
<p>Key Takeaways for Security &amp; IT Leaders </p>
<ol>
<li>Reduce reliance on unmanaged printers by promoting secure digital workflows. Encourage employees to use e-signatures and encrypted file sharing instead of printing. </li>
<li>Update remote work policies to cover home and travel printing. Most organizations don’t monitor printing outside the office—explicit rules reduce blind spots. </li>
<li>Require secure wiping or destruction of printer hard drives before disposal. Printers retain sensitive files and credentials, which can walk out the door if not properly handled. </li>
<li>Implement secure enterprise printing with authenticated release and HDD encryption. Treat printers as endpoints and apply the same safeguards you would for laptops.</li>
<li>Train employees to recognize that printers are data risks, not just office equipment. Awareness helps prevent careless mistakes like walk-away leaks or using hotel printers. </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://www.npr.org/2025/08/16/nx-s1-5504196/trump-putin-summit-documents-left-behind'>NPR: Trump–Putin Summit Documents Left Behind in Anchorage Hotel Printer (2025)</a> </li>
</ul>
<ul>
<li>Dark Reading: <a href='https://www.darkreading.com/endpoint-security/printers-cybersecurity-threats-too-often-ignored'>“Printers’ Cybersecurity Threats Too Often Ignored”</a>  </li>
</ul>
<ul>
<li>LMG Security: <a href='https://www.lmgsecurity.com/the-coronavirus-work-from-home-cybersecurity-checklist-for-executives-it-remote-employees'>“Work from Home Cybersecurity Checklist”</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. </p>
<p>But the real story isn’t just about geopolitics. It’s about how unmanaged printers—at hotels, in home offices, and everywhere in between—remain one of the most overlooked backdoors for data leaks. In this episode of Cyberside Chats, Sherri and Matt unpack the Alaska incident, explore why printers are still a weak spot in the age of remote and traveling workforces, and share practical steps to secure them. </p>
<p>Key Takeaways for Security &amp; IT Leaders </p>
<ol>
<li>Reduce reliance on unmanaged printers by promoting secure digital workflows. Encourage employees to use e-signatures and encrypted file sharing instead of printing. </li>
<li>Update remote work policies to cover home and travel printing. Most organizations don’t monitor printing outside the office—explicit rules reduce blind spots. </li>
<li>Require secure wiping or destruction of printer hard drives before disposal. Printers retain sensitive files and credentials, which can walk out the door if not properly handled. </li>
<li>Implement secure enterprise printing with authenticated release and HDD encryption. Treat printers as endpoints and apply the same safeguards you would for laptops.</li>
<li>Train employees to recognize that printers are data risks, not just office equipment. Awareness helps prevent careless mistakes like walk-away leaks or using hotel printers. </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://www.npr.org/2025/08/16/nx-s1-5504196/trump-putin-summit-documents-left-behind'>NPR: Trump–Putin Summit Documents Left Behind in Anchorage Hotel Printer (2025)</a> </li>
</ul>
<ul>
<li>Dark Reading: <a href='https://www.darkreading.com/endpoint-security/printers-cybersecurity-threats-too-often-ignored'>“Printers’ Cybersecurity Threats Too Often Ignored”</a>  </li>
</ul>
<ul>
<li>LMG Security: <a href='https://www.lmgsecurity.com/the-coronavirus-work-from-home-cybersecurity-checklist-for-executives-it-remote-employees'>“Work from Home Cybersecurity Checklist”</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vuimqthhnkb3wrdd/CSChats_34_-_EP_34_08_25_25_Printer_Problems_MP3_FINAL_v1bpmyq.mp3" length="25908432" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. 
But the real story isn’t just about geopolitics. It’s about how unmanaged printers—at hotels, in home offices, and everywhere in between—remain one of the most overlooked backdoors for data leaks. In this episode of Cyberside Chats, Sherri and Matt unpack the Alaska incident, explore why printers are still a weak spot in the age of remote and traveling workforces, and share practical steps to secure them. 
Key Takeaways for Security &amp; IT Leaders 

Reduce reliance on unmanaged printers by promoting secure digital workflows. Encourage employees to use e-signatures and encrypted file sharing instead of printing. 
Update remote work policies to cover home and travel printing. Most organizations don’t monitor printing outside the office—explicit rules reduce blind spots. 
Require secure wiping or destruction of printer hard drives before disposal. Printers retain sensitive files and credentials, which can walk out the door if not properly handled. 
Implement secure enterprise printing with authenticated release and HDD encryption. Treat printers as endpoints and apply the same safeguards you would for laptops.
Train employees to recognize that printers are data risks, not just office equipment. Awareness helps prevent careless mistakes like walk-away leaks or using hotel printers. 

Resources 

NPR: Trump–Putin Summit Documents Left Behind in Anchorage Hotel Printer (2025) 


Dark Reading: “Printers’ Cybersecurity Threats Too Often Ignored”  


LMG Security: “Work from Home Cybersecurity Checklist” 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>951</itunes:duration>
                <itunes:episode>34</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/yejwra8w8f5dz2yc/CSChats_34_-_EP_34_08_25_25_Printer_Problems_MP3_FINAL_v1bpmyq-3yvbtz-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/abcjaakpd8kstamj/CSChats_34_-_EP_34_08_25_25_Printer_Problems_MP3_FINAL_v1bpmyq_chapters.json" type="application/json" />    </item>
    <item>
        <title>Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain</title>
        <itunes:title>Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain</itunes:title>
        <link>https://www.chatcyberside.com/e/hackers-target-salesforce-the-rise-of-consent-phishing-and-connected-app-breaches/</link>
                    <comments>https://www.chatcyberside.com/e/hackers-target-salesforce-the-rise-of-consent-phishing-and-connected-app-breaches/#comments</comments>        <pubDate>Tue, 19 Aug 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/615800d9-f6e6-3ab4-bc62-e343968b3ea2</guid>
                                    <description><![CDATA[<p>A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. </p>
<p>In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down how the attackers pulled off one of the most sweeping cloud compromise campaigns in recent memory — using no zero-day exploits, just convincing phone calls, malicious connected apps, and gaps in cloud supply chain security. </p>
<p>We’ll explore the attack timeline, parallels to the Snowflake breaches, ties to the Scattered Spider crew, and the lessons security leaders need to act on right now. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Use phishing-resistant MFA — FIDO2 keys, passkeys. </li>
</ol>
<ol>
<li>Train for vishing resistance — simulate phone-based social engineering. </li>
</ol>
<ol>
<li>Monitor for abnormal data exports from SaaS platforms. </li>
</ol>
<ol>
<li>Lockdown your Salesforce platform — vet and limit connected apps. </li>
</ol>
<ol>
<li>Rehearse rapid containment — revoke OAuth tokens, disable accounts fast. </li>
</ol>
<p> </p>
<p>References </p>
<ul>
<li>Google - <a href='https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion'>The Cost of a Call: From Voice Phishing to Data Extortion</a>  </li>
</ul>
<ul>
<li>Salesforce – <a href='https://www.salesforce.com/blog/protect-against-social-engineering/'>Protect Your Salesforce Environment from Social Engineering Threats</a> </li>
</ul>
<ul>
<li>BleepingComputer – <a href='https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/'>ShinyHunters behind Salesforce data theft at Qantas, Allianz Life, LVMH</a> </li>
</ul>
<ul>
<li>TechRadar – <a href='https://www.techradar.com/pro/security/google-says-hackers-stole-some-of-its-data-following-salesforce-breach'>Google says hackers stole some of its data following Salesforce breach</a> </li>
</ul>
<ul>
<li>LMG Security Blog – <a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>Our Q3 2024 Top Control is Third Party Risk Management: Lessons from the CrowdStrike Outage</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. </p>
<p>In this episode of <em>Cyberside Chats</em>, Sherri Davidoff and Matt Durrin break down how the attackers pulled off one of the most sweeping cloud compromise campaigns in recent memory — using no zero-day exploits, just convincing phone calls, malicious connected apps, and gaps in cloud supply chain security. </p>
<p>We’ll explore the attack timeline, parallels to the Snowflake breaches, ties to the Scattered Spider crew, and the lessons security leaders need to act on right now. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Use phishing-resistant MFA — FIDO2 keys, passkeys. </li>
</ol>
<ol>
<li>Train for vishing resistance — simulate phone-based social engineering. </li>
</ol>
<ol>
<li>Monitor for abnormal data exports from SaaS platforms. </li>
</ol>
<ol>
<li>Lockdown your Salesforce platform — vet and limit connected apps. </li>
</ol>
<ol>
<li>Rehearse rapid containment — revoke OAuth tokens, disable accounts fast. </li>
</ol>
<p> </p>
<p>References </p>
<ul>
<li>Google - <a href='https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion'>The Cost of a Call: From Voice Phishing to Data Extortion</a>  </li>
</ul>
<ul>
<li>Salesforce – <a href='https://www.salesforce.com/blog/protect-against-social-engineering/'>Protect Your Salesforce Environment from Social Engineering Threats</a> </li>
</ul>
<ul>
<li>BleepingComputer – <a href='https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/'>ShinyHunters behind Salesforce data theft at Qantas, Allianz Life, LVMH</a> </li>
</ul>
<ul>
<li>TechRadar – <a href='https://www.techradar.com/pro/security/google-says-hackers-stole-some-of-its-data-following-salesforce-breach'>Google says hackers stole some of its data following Salesforce breach</a> </li>
</ul>
<ul>
<li>LMG Security Blog – <a href='https://www.lmgsecurity.com/our-q3-2024-top-control-is-third-party-risk-management-lessons-from-the-crowdstrike-outage/'>Our Q3 2024 Top Control is Third Party Risk Management: Lessons from the CrowdStrike Outage</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b6zbik65ankg22wb/CSChats_336tzx5-hgadjc-Optimized.mp3" length="17162893" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. 
In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down how the attackers pulled off one of the most sweeping cloud compromise campaigns in recent memory — using no zero-day exploits, just convincing phone calls, malicious connected apps, and gaps in cloud supply chain security. 
We’ll explore the attack timeline, parallels to the Snowflake breaches, ties to the Scattered Spider crew, and the lessons security leaders need to act on right now. 
 
Key Takeaways 

Use phishing-resistant MFA — FIDO2 keys, passkeys. 


Train for vishing resistance — simulate phone-based social engineering. 


Monitor for abnormal data exports from SaaS platforms. 


Lockdown your Salesforce platform — vet and limit connected apps. 


Rehearse rapid containment — revoke OAuth tokens, disable accounts fast. 

 
References 

Google - The Cost of a Call: From Voice Phishing to Data Extortion  


Salesforce – Protect Your Salesforce Environment from Social Engineering Threats 


BleepingComputer – ShinyHunters behind Salesforce data theft at Qantas, Allianz Life, LVMH 


TechRadar – Google says hackers stole some of its data following Salesforce breach 


LMG Security Blog – Our Q3 2024 Top Control is Third Party Risk Management: Lessons from the CrowdStrike Outage 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>865</itunes:duration>
                <itunes:episode>33</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/fchxez3cfsfbweyd/CSChats_336tzx5-hgadjc-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/5qsbmymsqcgbm88i/CSChats_336tzx5-hgadjc-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies</title>
        <itunes:title>North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-the-north-korean-cyber-threat/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-the-north-korean-cyber-threat/#comments</comments>        <pubDate>Tue, 12 Aug 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/4c9947bf-810d-3a6b-b5d0-3cd78e56165e</guid>
                                    <description><![CDATA[<p>On National Social Engineering Day, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. </p>
<p>Using AI-generated résumés, real-time deepfake interviews, and U.S.-based “laptop farms,” DPRK operatives are gaining legitimate employment inside U.S. companies — funding nuclear weapons programs and potentially opening doors to cyber espionage. </p>
<p>We’ll cover the recent U.S. sanctions, the Christina Chapman laptop farm case, and the latest intelligence from CrowdStrike on FAMOUS CHOLLIMA — plus, we’ll give you specific, actionable ways to harden your hiring process and catch these threats before they embed inside your network. </p>
<p>Actionable Takeaways for Defenders </p>
<ol>
<li>Verify Beyond the Résumé:Pair government ID checks with independent work history and social profile verification. Use services to flag synthetic or stolen identities.</li>
<li>Deepfake-Proof Interviews:Add unscripted, live identity challenges during video calls (lighting changes, head turns, holding ID on camera).</li>
<li>Geolocation &amp; Device Monitoring: Implement controls to detect impossible travel, VPN/geolocation masking, and multiple logins from the same endpoint for different accounts.</li>
<li>Watch for Multi-Job Signals: Monitor productivity patterns and unusual scheduling; red flags include unexplained work delays, identical deliverables across projects, or heavy reliance on AI-generated output.</li>
<li>Hold Your Vendors to the Same Standard: Ensure tech vendors and contractors use equivalent vetting, monitoring, and access control measures. Bake these requirements into contracts and third-party risk assessments. </li>
</ol>
<p>References</p>
<ul>
<li>U.S. Treasury Press Release – <a href='https://home.treasury.gov/news/press-releases'>Sanctions on DPRK IT Worker Scheme</a> </li>
<li>CrowdStrike 2025 Threat Hunting Report – <a href='https://www.crowdstrike.com/en-us/resources/reports/threat-hunting-report/'>Profile of FAMOUS CHOLLIMA’s AI-powered infiltration methods</a> </li>
<li>National Social Engineering Day – <a href='https://www.businesswire.com/news/home/20240806251777/en/KnowBe4-Establishes-August-6-as-National-Social-Engineering-Day'>KnowBe4 Announcement Honoring Kevin Mitnick</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>On <em>National Social Engineering Day</em>, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. </p>
<p>Using AI-generated résumés, real-time deepfake interviews, and U.S.-based “laptop farms,” DPRK operatives are gaining legitimate employment inside U.S. companies — funding nuclear weapons programs and potentially opening doors to cyber espionage. </p>
<p>We’ll cover the recent U.S. sanctions, the Christina Chapman laptop farm case, and the latest intelligence from CrowdStrike on FAMOUS CHOLLIMA — plus, we’ll give you specific, actionable ways to harden your hiring process and catch these threats before they embed inside your network. </p>
<p>Actionable Takeaways for Defenders </p>
<ol>
<li>Verify Beyond the Résumé:Pair government ID checks with independent work history and social profile verification. Use services to flag synthetic or stolen identities.</li>
<li>Deepfake-Proof Interviews:Add unscripted, live identity challenges during video calls (lighting changes, head turns, holding ID on camera).</li>
<li>Geolocation &amp; Device Monitoring: Implement controls to detect impossible travel, VPN/geolocation masking, and multiple logins from the same endpoint for different accounts.</li>
<li>Watch for Multi-Job Signals: Monitor productivity patterns and unusual scheduling; red flags include unexplained work delays, identical deliverables across projects, or heavy reliance on AI-generated output.</li>
<li>Hold Your Vendors to the Same Standard: Ensure tech vendors and contractors use equivalent vetting, monitoring, and access control measures. Bake these requirements into contracts and third-party risk assessments. </li>
</ol>
<p>References</p>
<ul>
<li>U.S. Treasury Press Release – <a href='https://home.treasury.gov/news/press-releases'>Sanctions on DPRK IT Worker Scheme</a> </li>
<li>CrowdStrike 2025 Threat Hunting Report – <a href='https://www.crowdstrike.com/en-us/resources/reports/threat-hunting-report/'>Profile of FAMOUS CHOLLIMA’s AI-powered infiltration methods</a> </li>
<li>National Social Engineering Day – <a href='https://www.businesswire.com/news/home/20240806251777/en/KnowBe4-Establishes-August-6-as-National-Social-Engineering-Day'>KnowBe4 Announcement Honoring Kevin Mitnick</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/63xjrw9ku9g9qvp8/CSChats_3268n09-9n8rqk-Optimized.mp3" length="17213522" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On National Social Engineering Day, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. 
Using AI-generated résumés, real-time deepfake interviews, and U.S.-based “laptop farms,” DPRK operatives are gaining legitimate employment inside U.S. companies — funding nuclear weapons programs and potentially opening doors to cyber espionage. 
We’ll cover the recent U.S. sanctions, the Christina Chapman laptop farm case, and the latest intelligence from CrowdStrike on FAMOUS CHOLLIMA — plus, we’ll give you specific, actionable ways to harden your hiring process and catch these threats before they embed inside your network. 
Actionable Takeaways for Defenders 

Verify Beyond the Résumé:Pair government ID checks with independent work history and social profile verification. Use services to flag synthetic or stolen identities.
Deepfake-Proof Interviews:Add unscripted, live identity challenges during video calls (lighting changes, head turns, holding ID on camera).
Geolocation &amp; Device Monitoring: Implement controls to detect impossible travel, VPN/geolocation masking, and multiple logins from the same endpoint for different accounts.
Watch for Multi-Job Signals: Monitor productivity patterns and unusual scheduling; red flags include unexplained work delays, identical deliverables across projects, or heavy reliance on AI-generated output.
Hold Your Vendors to the Same Standard: Ensure tech vendors and contractors use equivalent vetting, monitoring, and access control measures. Bake these requirements into contracts and third-party risk assessments. 

References

U.S. Treasury Press Release – Sanctions on DPRK IT Worker Scheme 
CrowdStrike 2025 Threat Hunting Report – Profile of FAMOUS CHOLLIMA’s AI-powered infiltration methods 
National Social Engineering Day – KnowBe4 Announcement Honoring Kevin Mitnick 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>868</itunes:duration>
                <itunes:episode>32</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/pvq3dn86w5smmabf/CSChats_3268n09-9n8rqk-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/vgpdjy4fnytbv8he/CSChats_3268n09-9n8rqk-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security</title>
        <itunes:title>The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-the-amazon-q-ai-hack-the-hidden-dangers-in-software-development/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-the-amazon-q-ai-hack-the-hidden-dangers-in-software-development/#comments</comments>        <pubDate>Tue, 05 Aug 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/7b2d08c0-eead-3bf7-bef8-a04b4113a90f</guid>
                                    <description><![CDATA[<p>A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of Cyberside Chats, we’re diving into the Amazon Q AI Hack, a shocking example of how vulnerable our software development tools have become.</p>
<p>Join hosts Sherri Davidoff and Matt Durrin as they unpack how a misconfigured GitHub token allowed a hacker to inject destructive AI commands into a popular developer tool. We’ll walk through exactly what happened, how GitHub security missteps enabled the attack, and why this incident is a critical wake-up call for supply chain security and AI tool governance.</p>
<p>We’ll also spotlight other supply chain breaches like the SolarWinds Orion backdoor and XZ Utils compromise, plus AI tool mishaps where “helpful” assistants caused real-world damage. If your organization uses AI developer tools—or works with third-party software vendors—this episode is a must-listen.</p>
<p>Key Takeaways:
▪ Don’t Assume AI Tools Are Safe Just Because They’re Popular
Amazon Q had nearly a million installs—and it still shipped with malicious code. Before adopting any AI-based tools (like Copilot, Q, or Gemini), vet their permissions, access scope, and how updates are managed.</p>
<p>▪ Ask Your Software Vendors About Their Supply Chain Security
If you rely on third-party developers or vendors, request details on how they manage build pipelines, review code changes, and prevent unauthorized commits. A compromised vendor can put your entire environment at risk.</p>
<p>▪ Hold Vendors Accountable for Secure Development Practices
Ask whether your vendors enforce commit signing, use GitHub security features (like push protection and secret scanning), and apply multi-person code review processes. If they can't answer, that's a red flag.</p>
<p>▪ Be Wary of Giving AI Assistants Too Much Access
Whether it’s an AI chatbot that can write config files or a developer tool that interacts with production environments, limit access. Always sandbox and monitor AI-integrated tools, and avoid letting them make direct changes.</p>
<p>▪ Prepare to Hear About Breaches From the Outside
Just like Amazon only found out about the malicious code in Q after security researchers reported it, many organizations won’t catch third-party security issues internally. Make sure you have monitoring tools, vendor communication protocols, and incident response processes in place.</p>
<p>▪ If You Develop Code Internally, Lock Down Your Build Pipeline
The Amazon Q hack happened because of a misconfigured GitHub token in a CI workflow. If you’re building your own code, review permissions on GitHub tokens, enforce branch protections, and require signed commits to prevent unauthorized changes from slipping into production.

#Cybersecurity #SupplyChainSecurity #AItools #DevSecOps #AmazonQHack #GitHubSecurity #Infosec #CybersideChats #LMGSecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of <em>Cyberside Chats</em>, we’re diving into the Amazon Q AI Hack, a shocking example of how vulnerable our software development tools have become.</p>
<p>Join hosts Sherri Davidoff and Matt Durrin as they unpack how a misconfigured GitHub token allowed a hacker to inject destructive AI commands into a popular developer tool. We’ll walk through exactly what happened, how GitHub security missteps enabled the attack, and why this incident is a critical wake-up call for supply chain security and AI tool governance.</p>
<p>We’ll also spotlight other supply chain breaches like the SolarWinds Orion backdoor and XZ Utils compromise, plus AI tool mishaps where “helpful” assistants caused real-world damage. If your organization uses AI developer tools—or works with third-party software vendors—this episode is a must-listen.</p>
<p>Key Takeaways:<br>
▪ Don’t Assume AI Tools Are Safe Just Because They’re Popular<br>
Amazon Q had nearly a million installs—and it still shipped with malicious code. Before adopting any AI-based tools (like Copilot, Q, or Gemini), vet their permissions, access scope, and how updates are managed.</p>
<p>▪ Ask Your Software Vendors About Their Supply Chain Security<br>
If you rely on third-party developers or vendors, request details on how they manage build pipelines, review code changes, and prevent unauthorized commits. A compromised vendor can put your entire environment at risk.</p>
<p>▪ Hold Vendors Accountable for Secure Development Practices<br>
Ask whether your vendors enforce commit signing, use GitHub security features (like push protection and secret scanning), and apply multi-person code review processes. If they can't answer, that's a red flag.</p>
<p>▪ Be Wary of Giving AI Assistants Too Much Access<br>
Whether it’s an AI chatbot that can write config files or a developer tool that interacts with production environments, limit access. Always sandbox and monitor AI-integrated tools, and avoid letting them make direct changes.</p>
<p>▪ Prepare to Hear About Breaches From the Outside<br>
Just like Amazon only found out about the malicious code in Q after security researchers reported it, many organizations won’t catch third-party security issues internally. Make sure you have monitoring tools, vendor communication protocols, and incident response processes in place.</p>
<p>▪ If You Develop Code Internally, Lock Down Your Build Pipeline<br>
The Amazon Q hack happened because of a misconfigured GitHub token in a CI workflow. If you’re building your own code, review permissions on GitHub tokens, enforce branch protections, and require signed commits to prevent unauthorized changes from slipping into production.<br>
<br>
#Cybersecurity #SupplyChainSecurity #AItools #DevSecOps #AmazonQHack #GitHubSecurity #Infosec #CybersideChats #LMGSecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mhhiyt2er2mn466w/CSChats_31bq58s-xmeypv-Optimized.mp3" length="24068912" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of Cyberside Chats, we’re diving into the Amazon Q AI Hack, a shocking example of how vulnerable our software development tools have become.
Join hosts Sherri Davidoff and Matt Durrin as they unpack how a misconfigured GitHub token allowed a hacker to inject destructive AI commands into a popular developer tool. We’ll walk through exactly what happened, how GitHub security missteps enabled the attack, and why this incident is a critical wake-up call for supply chain security and AI tool governance.
We’ll also spotlight other supply chain breaches like the SolarWinds Orion backdoor and XZ Utils compromise, plus AI tool mishaps where “helpful” assistants caused real-world damage. If your organization uses AI developer tools—or works with third-party software vendors—this episode is a must-listen.
Key Takeaways:▪ Don’t Assume AI Tools Are Safe Just Because They’re PopularAmazon Q had nearly a million installs—and it still shipped with malicious code. Before adopting any AI-based tools (like Copilot, Q, or Gemini), vet their permissions, access scope, and how updates are managed.
▪ Ask Your Software Vendors About Their Supply Chain SecurityIf you rely on third-party developers or vendors, request details on how they manage build pipelines, review code changes, and prevent unauthorized commits. A compromised vendor can put your entire environment at risk.
▪ Hold Vendors Accountable for Secure Development PracticesAsk whether your vendors enforce commit signing, use GitHub security features (like push protection and secret scanning), and apply multi-person code review processes. If they can't answer, that's a red flag.
▪ Be Wary of Giving AI Assistants Too Much AccessWhether it’s an AI chatbot that can write config files or a developer tool that interacts with production environments, limit access. Always sandbox and monitor AI-integrated tools, and avoid letting them make direct changes.
▪ Prepare to Hear About Breaches From the OutsideJust like Amazon only found out about the malicious code in Q after security researchers reported it, many organizations won’t catch third-party security issues internally. Make sure you have monitoring tools, vendor communication protocols, and incident response processes in place.
▪ If You Develop Code Internally, Lock Down Your Build PipelineThe Amazon Q hack happened because of a misconfigured GitHub token in a CI workflow. If you’re building your own code, review permissions on GitHub tokens, enforce branch protections, and require signed commits to prevent unauthorized changes from slipping into production.#Cybersecurity #SupplyChainSecurity #AItools #DevSecOps #AmazonQHack #GitHubSecurity #Infosec #CybersideChats #LMGSecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1297</itunes:duration>
                <itunes:episode>31</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/jm2iu38chy6cvnxy/CSChats_31bq58s-xmeypv-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/na4kdrqs25j3c3ym/CSChats_31bq58s-xmeypv-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Iran’s Cyber Surge: Attacks Intensify in 2025</title>
        <itunes:title>Iran’s Cyber Surge: Attacks Intensify in 2025</itunes:title>
        <link>https://www.chatcyberside.com/e/the-title-of-cschats_308hyzz/</link>
                    <comments>https://www.chatcyberside.com/e/the-title-of-cschats_308hyzz/#comments</comments>        <pubDate>Tue, 29 Jul 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/61775fa4-46a7-319f-bbb4-a79eb3e449ad</guid>
                                    <description><![CDATA[<p>Iranian cyber operations have sharply escalated in 2025, targeting critical infrastructure, defense sectors, and global businesses—especially those linked to Israel and the U.S. From destructive malware and coordinated DDoS attacks to sophisticated hack-and-leak campaigns leveraging generative AI, Iranian threat actors are rapidly evolving. Join us to explore their latest tactics, notable incidents, and essential strategies to defend your organization. 
 
Hosts Sherri Davidoff and Matt Durrin break down wiper malware trends, AI-powered phishing, the use of deepfakes for psychological operations, and the critical role of patching and MFA in protecting against collateral damage. </p>
<p>Key Takeaways for Cybersecurity Leaders </p>
<ul>
<li>Patch Internet-Facing Systems Promptly: Iranian attackers frequently exploit unpatched systems—especially VPNs, SharePoint, and other perimeter-facing tools. Microsoft’s July Patch Tuesday alone included 137 vulnerabilities, including actively exploited zero-days. Stay current to avoid being an easy target. </li>
</ul>
<ul>
<li>Implement Phishing-Resistant Multifactor Authentication (MFA): Groups like Charming Kitten are leveraging generative AI to craft convincing spear phishing emails. Use MFA methods such as FIDO2 security keys, biometrics, or passkeys. Avoid push fatigue, SMS codes, or email-based MFA which are easily phished or bypassed. </li>
</ul>
<ul>
<li>Segment and Secure Critical IT &amp; OT Systems: Assume attackers will get in. Segment IT from OT networks (especially SCADA/ICS environments) and limit lateral movement. Iranian campaigns have crossed into OT, targeting backups and sabotaging ICS operations. </li>
</ul>
<ul>
<li>Maintain Robust, Tested Backup and Recovery Systems: Wiper malware and ransomware deployed by Iranian groups have destroyed both live data and backups. Use immutable or offline backups, and test full restores. Automate reimaging processes to ensure rapid recovery at scale. </li>
</ul>
<ul>
<li>Raise Awareness Against Sophisticated Social Engineering: Train staff to recognize AI-generated phishing and deepfake audio/video attacks. Iran has used deepfakes to spread disinformation and influence public perception. Show your team what deepfakes look and sound like so they can spot them in the wild. </li>
</ul>
<p>Resources &amp; References </p>
<p>CISA/FBI/NSA Joint Advisory: https://www.cisa.gov/sites/default/files/2025-06/joint-fact-sheet-Iranian-cyber-actors-may-target-vulnerable-US-networks-and-entities-of-interest-508c-1.pdf </p>
<p>Unit 42 Report: https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/ </p>
<p>Deepwatch Threat Intel: https://www.deepwatch.com/labs/customer-advisory-elevated-iranian-cyber-activity-post-u-s-strikes/ </p>
<p>LMG Security – Defending Against Generative AI Attacks: https://lmgsecurity.com/defend-against-generative-ai-attacks/ </p>
<p>#cybersecurity #cybercrime #cyberattack #cyberaware #cyberthreats #ciso #itsecurity #infosec #infosecurity #riskmanagement </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Iranian cyber operations have sharply escalated in 2025, targeting critical infrastructure, defense sectors, and global businesses—especially those linked to Israel and the U.S. From destructive malware and coordinated DDoS attacks to sophisticated hack-and-leak campaigns leveraging generative AI, Iranian threat actors are rapidly evolving. Join us to explore their latest tactics, notable incidents, and essential strategies to defend your organization. <br>
 <br>
Hosts Sherri Davidoff and Matt Durrin break down wiper malware trends, AI-powered phishing, the use of deepfakes for psychological operations, and the critical role of patching and MFA in protecting against collateral damage. </p>
<p>Key Takeaways for Cybersecurity Leaders </p>
<ul>
<li>Patch Internet-Facing Systems Promptly: Iranian attackers frequently exploit unpatched systems—especially VPNs, SharePoint, and other perimeter-facing tools. Microsoft’s July Patch Tuesday alone included 137 vulnerabilities, including actively exploited zero-days. Stay current to avoid being an easy target. </li>
</ul>
<ul>
<li>Implement Phishing-Resistant Multifactor Authentication (MFA): Groups like Charming Kitten are leveraging generative AI to craft convincing spear phishing emails. Use MFA methods such as FIDO2 security keys, biometrics, or passkeys. Avoid push fatigue, SMS codes, or email-based MFA which are easily phished or bypassed. </li>
</ul>
<ul>
<li>Segment and Secure Critical IT &amp; OT Systems: Assume attackers will get in. Segment IT from OT networks (especially SCADA/ICS environments) and limit lateral movement. Iranian campaigns have crossed into OT, targeting backups and sabotaging ICS operations. </li>
</ul>
<ul>
<li>Maintain Robust, Tested Backup and Recovery Systems: Wiper malware and ransomware deployed by Iranian groups have destroyed both live data and backups. Use immutable or offline backups, and test full restores. Automate reimaging processes to ensure rapid recovery at scale. </li>
</ul>
<ul>
<li>Raise Awareness Against Sophisticated Social Engineering: Train staff to recognize AI-generated phishing and deepfake audio/video attacks. Iran has used deepfakes to spread disinformation and influence public perception. Show your team what deepfakes look and sound like so they can spot them in the wild. </li>
</ul>
<p>Resources &amp; References </p>
<p>CISA/FBI/NSA Joint Advisory: https://www.cisa.gov/sites/default/files/2025-06/joint-fact-sheet-Iranian-cyber-actors-may-target-vulnerable-US-networks-and-entities-of-interest-508c-1.pdf </p>
<p>Unit 42 Report: https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/ </p>
<p>Deepwatch Threat Intel: https://www.deepwatch.com/labs/customer-advisory-elevated-iranian-cyber-activity-post-u-s-strikes/ </p>
<p>LMG Security – Defending Against Generative AI Attacks: https://lmgsecurity.com/defend-against-generative-ai-attacks/ </p>
<p>#cybersecurity #cybercrime #cyberattack #cyberaware #cyberthreats #ciso #itsecurity #infosec #infosecurity #riskmanagement </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/h9h8ibyhaerx93wz/CSChats_308hyzz.mp3" length="45020976" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Iranian cyber operations have sharply escalated in 2025, targeting critical infrastructure, defense sectors, and global businesses—especially those linked to Israel and the U.S. From destructive malware and coordinated DDoS attacks to sophisticated hack-and-leak campaigns leveraging generative AI, Iranian threat actors are rapidly evolving. Join us to explore their latest tactics, notable incidents, and essential strategies to defend your organization.  Hosts Sherri Davidoff and Matt Durrin break down wiper malware trends, AI-powered phishing, the use of deepfakes for psychological operations, and the critical role of patching and MFA in protecting against collateral damage. 
Key Takeaways for Cybersecurity Leaders 

Patch Internet-Facing Systems Promptly: Iranian attackers frequently exploit unpatched systems—especially VPNs, SharePoint, and other perimeter-facing tools. Microsoft’s July Patch Tuesday alone included 137 vulnerabilities, including actively exploited zero-days. Stay current to avoid being an easy target. 


Implement Phishing-Resistant Multifactor Authentication (MFA): Groups like Charming Kitten are leveraging generative AI to craft convincing spear phishing emails. Use MFA methods such as FIDO2 security keys, biometrics, or passkeys. Avoid push fatigue, SMS codes, or email-based MFA which are easily phished or bypassed. 


Segment and Secure Critical IT &amp; OT Systems: Assume attackers will get in. Segment IT from OT networks (especially SCADA/ICS environments) and limit lateral movement. Iranian campaigns have crossed into OT, targeting backups and sabotaging ICS operations. 


Maintain Robust, Tested Backup and Recovery Systems: Wiper malware and ransomware deployed by Iranian groups have destroyed both live data and backups. Use immutable or offline backups, and test full restores. Automate reimaging processes to ensure rapid recovery at scale. 


Raise Awareness Against Sophisticated Social Engineering: Train staff to recognize AI-generated phishing and deepfake audio/video attacks. Iran has used deepfakes to spread disinformation and influence public perception. Show your team what deepfakes look and sound like so they can spot them in the wild. 

Resources &amp; References 
CISA/FBI/NSA Joint Advisory: https://www.cisa.gov/sites/default/files/2025-06/joint-fact-sheet-Iranian-cyber-actors-may-target-vulnerable-US-networks-and-entities-of-interest-508c-1.pdf 
Unit 42 Report: https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/ 
Deepwatch Threat Intel: https://www.deepwatch.com/labs/customer-advisory-elevated-iranian-cyber-activity-post-u-s-strikes/ 
LMG Security – Defending Against Generative AI Attacks: https://lmgsecurity.com/defend-against-generative-ai-attacks/ 
#cybersecurity #cybercrime #cyberattack #cyberaware #cyberthreats #ciso #itsecurity #infosec #infosecurity #riskmanagement ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1682</itunes:duration>
                <itunes:episode>30</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/m4umbz5ivjsvynwn/CSChats_308hyzz-rxzcuc-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/tjxxd5yp2qkh6wbs/CSChats_308hyzz_chapters.json" type="application/json" />    </item>
    <item>
        <title>Leaked and Loaded: DOGE’s API Key Crisis</title>
        <itunes:title>Leaked and Loaded: DOGE’s API Key Crisis</itunes:title>
        <link>https://www.chatcyberside.com/e/api-key-catastrophe-when-secrets-get-leaked/</link>
                    <comments>https://www.chatcyberside.com/e/api-key-catastrophe-when-secrets-get-leaked/#comments</comments>        <pubDate>Tue, 22 Jul 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/1a80b589-3bb4-3c44-9bc1-ff69ab54f974</guid>
                                    <description><![CDATA[<p>On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. </p>
<p>In this episode of Cyberside Chats, we examine how a single leaked credential became a national-level risk—and how it mirrors broader API key exposures at BeyondTrust and across GitHub. LMG Security’s Director of Penetration Testing, Tom Pohl, shares red team insights on how embedded secrets give attackers a foothold—and what CISOs must do now to reduce their exposure. </p>
<p> </p>
<p>Key Takeaways: </p>
<ol>
<li> Treat leaked API keys like a full-blown incident—whether it’s your code or a vendor’s.</li>
</ol>
<p> Monitor for exposure and misuse. Include secrets in IR playbooks—even when it’s third-party code. </p>
<ol start="2">
<li> Ask your vendors the hard questions about secrets management.</li>
</ol>
<p> Do they rotate keys? Use a secrets manager? How quickly can they revoke? </p>
<ol start="3">
<li> Scan your environment for exposed secrets, even if you don’t develop software.</li>
</ol>
<p> Look for credentials in cloud configs, automation, scripts, SaaS tools. </p>
<ol start="4">
<li> Make sure your penetration testing team searches for secrets as part of their processes. </li>
</ol>
<p>Secrets can show up in unexpected places—firmware, config files, build artifacts. Your red team or vendor should actively hunt for exposed keys, hardcoded credentials, and reused certs across applications, infrastructure, and third-party tools. </p>
<ol start="5">
<li> Train your IT staff and developers to remove secrets from code and automate detection.</li>
</ol>
<p> Use GitGuardian, TruffleHog, and a secrets manager like AWS Secrets Manager or HashiCorp Vault. </p>
<p>References: </p>
<ul>
<li>Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security – LMG Security: https://www.LMGsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security/ </li>
</ul>
<ul>
<li>"Private Keys in Public Places”  - DEFCON talk by Tom Pohl, LMG Security: https://www.youtube.com/watch?v=7t_ntuSXniw </li>
</ul>
<ul>
<li>DOGE employee leaks private xAI API key from sensitive database – TechRadar: https://www.techradar.com/pro/security/doge-employee-with-sensitive-database-access-leaks-private-xai-api-key </li>
</ul>
<p> <a href='https://www.youtube.com/hashtag/dogeleak'>#DOGEleak</a> <a href='https://www.youtube.com/hashtag/cybersecurity'>#cybersecurity</a> <a href='https://www.youtube.com/hashtag/cybersecurityawareness'>#cybersecurityawareness</a> <a href='https://www.youtube.com/hashtag/ciso'>#ciso</a> <a href='https://www.youtube.com/hashtag/infosec'>#infosec</a> <a href='https://www.youtube.com/hashtag/itsecurity'>#itsecurity</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. </p>
<p>In this episode of <em>Cyberside Chats</em>, we examine how a single leaked credential became a national-level risk—and how it mirrors broader API key exposures at BeyondTrust and across GitHub. LMG Security’s Director of Penetration Testing, Tom Pohl, shares red team insights on how embedded secrets give attackers a foothold—and what CISOs must do now to reduce their exposure. </p>
<p> </p>
<p>Key Takeaways: </p>
<ol>
<li> Treat leaked API keys like a full-blown incident—whether it’s your code or a vendor’s.</li>
</ol>
<p> Monitor for exposure and misuse. Include secrets in IR playbooks—even when it’s third-party code. </p>
<ol start="2">
<li> Ask your vendors the hard questions about secrets management.</li>
</ol>
<p> Do they rotate keys? Use a secrets manager? How quickly can they revoke? </p>
<ol start="3">
<li> Scan your environment for exposed secrets, even if you don’t develop software.</li>
</ol>
<p> Look for credentials in cloud configs, automation, scripts, SaaS tools. </p>
<ol start="4">
<li> Make sure your penetration testing team searches for secrets as part of their processes. </li>
</ol>
<p>Secrets can show up in unexpected places—firmware, config files, build artifacts. Your red team or vendor should actively hunt for exposed keys, hardcoded credentials, and reused certs across applications, infrastructure, and third-party tools. </p>
<ol start="5">
<li> Train your IT staff and developers to remove secrets from code and automate detection.</li>
</ol>
<p> Use GitGuardian, TruffleHog, and a secrets manager like AWS Secrets Manager or HashiCorp Vault. </p>
<p>References: </p>
<ul>
<li><em>Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security</em> – LMG Security: https://www.LMGsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security/ </li>
</ul>
<ul>
<li><em>"Private Keys in Public Places”  - DEFCON talk by Tom Pohl, LMG Security:</em> https://www.youtube.com/watch?v=7t_ntuSXniw </li>
</ul>
<ul>
<li><em>DOGE employee leaks private xAI API key from sensitive database</em> – TechRadar: https://www.techradar.com/pro/security/doge-employee-with-sensitive-database-access-leaks-private-xai-api-key </li>
</ul>
<p> <a href='https://www.youtube.com/hashtag/dogeleak'>#DOGEleak</a> <a href='https://www.youtube.com/hashtag/cybersecurity'>#cybersecurity</a> <a href='https://www.youtube.com/hashtag/cybersecurityawareness'>#cybersecurityawareness</a> <a href='https://www.youtube.com/hashtag/ciso'>#ciso</a> <a href='https://www.youtube.com/hashtag/infosec'>#infosec</a> <a href='https://www.youtube.com/hashtag/itsecurity'>#itsecurity</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/smj7vw2nsbndsdkk/CSChats_297d0i9-j7emb7-Optimized.mp3" length="15370986" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. 
In this episode of Cyberside Chats, we examine how a single leaked credential became a national-level risk—and how it mirrors broader API key exposures at BeyondTrust and across GitHub. LMG Security’s Director of Penetration Testing, Tom Pohl, shares red team insights on how embedded secrets give attackers a foothold—and what CISOs must do now to reduce their exposure. 
 
Key Takeaways: 

 Treat leaked API keys like a full-blown incident—whether it’s your code or a vendor’s.

 Monitor for exposure and misuse. Include secrets in IR playbooks—even when it’s third-party code. 

 Ask your vendors the hard questions about secrets management.

 Do they rotate keys? Use a secrets manager? How quickly can they revoke? 

 Scan your environment for exposed secrets, even if you don’t develop software.

 Look for credentials in cloud configs, automation, scripts, SaaS tools. 

 Make sure your penetration testing team searches for secrets as part of their processes. 

Secrets can show up in unexpected places—firmware, config files, build artifacts. Your red team or vendor should actively hunt for exposed keys, hardcoded credentials, and reused certs across applications, infrastructure, and third-party tools. 

 Train your IT staff and developers to remove secrets from code and automate detection.

 Use GitGuardian, TruffleHog, and a secrets manager like AWS Secrets Manager or HashiCorp Vault. 
References: 

Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security – LMG Security: https://www.LMGsecurity.com/exposed-secrets-broken-trust-what-the-doge-api-key-leak-teaches-us-about-software-security/ 


"Private Keys in Public Places”  - DEFCON talk by Tom Pohl, LMG Security: https://www.youtube.com/watch?v=7t_ntuSXniw 


DOGE employee leaks private xAI API key from sensitive database – TechRadar: https://www.techradar.com/pro/security/doge-employee-with-sensitive-database-access-leaks-private-xai-api-key 

 #DOGEleak #cybersecurity #cybersecurityawareness #ciso #infosec #itsecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>922</itunes:duration>
                <itunes:episode>29</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/83jb3q8h5shjc5cq/CSChats_297d0i9-j7emb7-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/a8samy2u9vg78jg4/CSChats_297d0i9-j7emb7-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Holiday Horror Stories: Why Hackers Love Long Weekends</title>
        <itunes:title>Holiday Horror Stories: Why Hackers Love Long Weekends</itunes:title>
        <link>https://www.chatcyberside.com/e/cyber-attacks-on-holiday-weekends-a-growing-threat/</link>
                    <comments>https://www.chatcyberside.com/e/cyber-attacks-on-holiday-weekends-a-growing-threat/#comments</comments>        <pubDate>Tue, 15 Jul 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/2dde1f2a-4ca5-39ba-86d6-630930457b58</guid>
                                    <description><![CDATA[<p>Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock.</p>
<p> </p>
Takeaways:
<ol>
<li>Treat Holiday Weekends as Elevated Threat Windows
Plan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk.</li>
<li>Establish and Test Off-Hours Response Plans
Ensure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups.</li>
<li>Reduce Your Attack Surface and Harden Perimeter Before the Break
Conduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights.</li>
<li>Practice Incident Response Tabletop Exercises With Holiday Timing in Mind
Simulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints.</li>
<li>Communicate Expectations Across the Organization and With 3rd Parties
Brief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa).</li>
</ol>
Resources:
<ul>
<li><a href='https://www.rapid7.com/blog/post/2023/06/14/etr-cve-2023-34362-moveit-vulnerability-timeline-of-events/'>MOVEit Data Breach Timeline – Rapid7</a></li>
<li><a href='https://www.varonis.com/blog/revil-msp-supply-chain-attack'>Kaseya Ransomware Attack Explained – Varonis</a></li>
<li><a href='https://darknetdiaries.com/transcript/72/'>Bangladesh Bank Heist – Darknet Diaries Episode 72</a></li>
<li><a href='https://www.lmgsecurity.com/services/training/tabletop-exercises/'>Tabletop Exercises &amp; Incident Response Planning – LMG Security</a></li>
</ul>
<p>#cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock.</p>
<p> </p>
Takeaways:
<ol>
<li>Treat Holiday Weekends as Elevated Threat Windows<br>
Plan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk.</li>
<li>Establish and Test Off-Hours Response Plans<br>
Ensure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups.</li>
<li>Reduce Your Attack Surface and Harden Perimeter Before the Break<br>
Conduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights.</li>
<li>Practice Incident Response Tabletop Exercises With Holiday Timing in Mind<br>
Simulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints.</li>
<li>Communicate Expectations Across the Organization and With 3rd Parties<br>
Brief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa).</li>
</ol>
Resources:
<ul>
<li><a href='https://www.rapid7.com/blog/post/2023/06/14/etr-cve-2023-34362-moveit-vulnerability-timeline-of-events/'>MOVEit Data Breach Timeline – Rapid7</a></li>
<li><a href='https://www.varonis.com/blog/revil-msp-supply-chain-attack'>Kaseya Ransomware Attack Explained – Varonis</a></li>
<li><a href='https://darknetdiaries.com/transcript/72/'>Bangladesh Bank Heist – Darknet Diaries Episode 72</a></li>
<li><a href='https://www.lmgsecurity.com/services/training/tabletop-exercises/'>Tabletop Exercises &amp; Incident Response Planning – LMG Security</a></li>
</ul>
<p>#cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/puynib6wuruzddpw/CSChats_286l115-mh89gg-Optimized.mp3" length="24581881" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock.
 
Takeaways:

Treat Holiday Weekends as Elevated Threat WindowsPlan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk.
Establish and Test Off-Hours Response PlansEnsure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups.
Reduce Your Attack Surface and Harden Perimeter Before the BreakConduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights.
Practice Incident Response Tabletop Exercises With Holiday Timing in MindSimulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints.
Communicate Expectations Across the Organization and With 3rd PartiesBrief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa).

Resources:

MOVEit Data Breach Timeline – Rapid7
Kaseya Ransomware Attack Explained – Varonis
Bangladesh Bank Heist – Darknet Diaries Episode 72
Tabletop Exercises &amp; Incident Response Planning – LMG Security

#cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1329</itunes:duration>
                <itunes:episode>28</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/q8q2n5rgpexd46md/CSChats_286l115-mh89gg-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/tiatwed5a2swtjid/CSChats_286l115-mh89gg-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands</title>
        <itunes:title>Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands</itunes:title>
        <link>https://www.chatcyberside.com/e/executive-order-shockwave-the-future-of-cybersecurity-unveiled/</link>
                    <comments>https://www.chatcyberside.com/e/executive-order-shockwave-the-future-of-cybersecurity-unveiled/#comments</comments>        <pubDate>Tue, 08 Jul 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/e8b5da06-24b6-3b0f-813e-0584e118cf3a</guid>
                                    <description><![CDATA[<p>In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-quantum encryption support and the FTC’s Cyber Trust Mark. We’ll talk about the practical impact for security leaders, why this mirrors past challenges like PCI compliance, and what your organization should do next.</p>
Key Takeaways (for CISOs and Security Leaders)
<ol>
<li>Don’t Drop SBOMs or Attestations — Build Them Into Contracts Anyway
Even without a federal requirement, insist on SBOMs and secure development attestations in vendor agreements. Transparency reduces your risk.</li>
<li>Re-Evaluate Third-Party Software Risk Practices Now
With no centralized validation, it's up to you to verify vendors' claims. Strengthen your third-party risk management processes accordingly.</li>
<li>Watch for Gaps in MFA, Encryption, and Identity Standards
Don’t assume basic protections are baked in. Federal rollback may signal declining baseline expectations—so enforce your own.</li>
<li>Prepare for Industry-Led Enforcement — From Insurers, Buyers, and Info-Sharing Groups
Expect cyber insurers, large enterprises, ISACs/ISAOs, and professional groups to lead on software transparency. Get ahead by aligning now.</li>
</ol>
<p>Resources:</p>
<ol>
<li> Full Text of the June 6, 2025 Executive Order: <a href='https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144'>https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144</a></li>
</ol>
<ol start="2">
<li> LMG Security: Software Supply Chain Security – Understanding and Mitigating Major Risks: <a href='https://www.lmgsecurity.com/software-supply-chain-security-understanding-and-mitigating-major-risks/'>https://www.lmgsecurity.com/software-supply-chain-security-understanding-and-mitigating-major-risks/</a></li>
</ol>
<ol start="3">
<li> The Record’s Breakdown: Trump Order Rolls Back Key Federal Cybersecurity Rules: <a href='https://therecord.media/trump-cybersecurity-executive-order-june-2025'>https://therecord.media/trump-cybersecurity-executive-order-june-2025</a></li>
</ol>]]></description>
                                                            <content:encoded><![CDATA[<p>In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-quantum encryption support and the FTC’s Cyber Trust Mark. We’ll talk about the practical impact for security leaders, why this mirrors past challenges like PCI compliance, and what your organization should do next.</p>
Key Takeaways (for CISOs and Security Leaders)
<ol>
<li>Don’t Drop SBOMs or Attestations — Build Them Into Contracts Anyway<br>
Even without a federal requirement, insist on SBOMs and secure development attestations in vendor agreements. Transparency reduces your risk.</li>
<li>Re-Evaluate Third-Party Software Risk Practices Now<br>
With no centralized validation, it's up to you to verify vendors' claims. Strengthen your third-party risk management processes accordingly.</li>
<li>Watch for Gaps in MFA, Encryption, and Identity Standards<br>
Don’t assume basic protections are baked in. Federal rollback may signal declining baseline expectations—so enforce your own.</li>
<li>Prepare for Industry-Led Enforcement — From Insurers, Buyers, and Info-Sharing Groups<br>
Expect cyber insurers, large enterprises, ISACs/ISAOs, and professional groups to lead on software transparency. Get ahead by aligning now.</li>
</ol>
<p>Resources:</p>
<ol>
<li> Full Text of the June 6, 2025 Executive Order: <a href='https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144'>https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144</a></li>
</ol>
<ol start="2">
<li> LMG Security: Software Supply Chain Security – Understanding and Mitigating Major Risks: <a href='https://www.lmgsecurity.com/software-supply-chain-security-understanding-and-mitigating-major-risks/'>https://www.lmgsecurity.com/software-supply-chain-security-understanding-and-mitigating-major-risks/</a></li>
</ol>
<ol start="3">
<li> The Record’s Breakdown: Trump Order Rolls Back Key Federal Cybersecurity Rules: <a href='https://therecord.media/trump-cybersecurity-executive-order-june-2025'>https://therecord.media/trump-cybersecurity-executive-order-june-2025</a></li>
</ol>]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7eb58gab7ydyeqjb/CSChats_27b99ir-ma4hcm-Optimized.mp3" length="22194092" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-quantum encryption support and the FTC’s Cyber Trust Mark. We’ll talk about the practical impact for security leaders, why this mirrors past challenges like PCI compliance, and what your organization should do next.
Key Takeaways (for CISOs and Security Leaders)

Don’t Drop SBOMs or Attestations — Build Them Into Contracts AnywayEven without a federal requirement, insist on SBOMs and secure development attestations in vendor agreements. Transparency reduces your risk.
Re-Evaluate Third-Party Software Risk Practices NowWith no centralized validation, it's up to you to verify vendors' claims. Strengthen your third-party risk management processes accordingly.
Watch for Gaps in MFA, Encryption, and Identity StandardsDon’t assume basic protections are baked in. Federal rollback may signal declining baseline expectations—so enforce your own.
Prepare for Industry-Led Enforcement — From Insurers, Buyers, and Info-Sharing GroupsExpect cyber insurers, large enterprises, ISACs/ISAOs, and professional groups to lead on software transparency. Get ahead by aligning now.

Resources:

 Full Text of the June 6, 2025 Executive Order: https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144


 LMG Security: Software Supply Chain Security – Understanding and Mitigating Major Risks: https://www.lmgsecurity.com/software-supply-chain-security-understanding-and-mitigating-major-risks/


 The Record’s Breakdown: Trump Order Rolls Back Key Federal Cybersecurity Rules: https://therecord.media/trump-cybersecurity-executive-order-june-2025
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1179</itunes:duration>
                <itunes:episode>27</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/jzwje6rqqw3gn94m/CSChats_27b99ir-ma4hcm-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/hqs9fna3ibcfwchj/CSChats_27b99ir-ma4hcm-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>No Lock, Just Leak</title>
        <itunes:title>No Lock, Just Leak</itunes:title>
        <link>https://www.chatcyberside.com/e/the-rise-of-ransomware-less-extortion-a-new-cyber-threat/</link>
                    <comments>https://www.chatcyberside.com/e/the-rise-of-ransomware-less-extortion-a-new-cyber-threat/#comments</comments>        <pubDate>Tue, 01 Jul 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/83f62f1c-44c9-32ca-be44-4fd84bf769d6</guid>
                                    <description><![CDATA[<p>Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up. </p>
<p>In this episode, we dive into the rise of data-only extortion campaigns and explore why encryption is becoming optional for cybercriminals. From real-world trends like the rebrand of Hunters International to “World Leaks,” to the strategic impact on insurance, PR, and compliance—this is a wake-up call for security teams everywhere. </p>
<p>If your playbook still ends with “just restore from backup,” you’re not ready. </p>
<p> </p>
<p>Takeaways for Security Teams: </p>
<ul>
<li>Rethink detection: Focus on exfiltration, not just malware. </li>
</ul>
<ul>
<li>Update tabletop exercises: Include public leaks, media scrutiny, and regulatory responses. </li>
</ul>
<ul>
<li>Review insurance policies: Ensure data-only extortion is covered, not just encryption events. </li>
</ul>
<ul>
<li>Prepare execs and PR: Modern extortion targets reputation and compliance pressure points. </li>
</ul>
<p>Resources &amp; Mentions: </p>
<ul>
<li>https://www.coveware.com/ransomware-quarterly-reports </li>
</ul>
<ul>
<li><a href='https://securityboulevard.com/2025/04/hunters-international-dumps-ransomware-goes-full-on-extortion'>Security Boulevard: Hunters International Rebrands as World Leaks:</a>  </li>
</ul>
<ul>
<li>https://attack.mitre.org/resources/ </li>
</ul>
<ul>
<li><a href='https://lmgsecurity.com/'>LMG Security</a> </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up. </p>
<p>In this episode, we dive into the rise of data-only extortion campaigns and explore why encryption is becoming optional for cybercriminals. From real-world trends like the rebrand of Hunters International to “World Leaks,” to the strategic impact on insurance, PR, and compliance—this is a wake-up call for security teams everywhere. </p>
<p>If your playbook still ends with “just restore from backup,” you’re not ready. </p>
<p> </p>
<p>Takeaways for Security Teams: </p>
<ul>
<li>Rethink detection: Focus on exfiltration, not just malware. </li>
</ul>
<ul>
<li>Update tabletop exercises: Include public leaks, media scrutiny, and regulatory responses. </li>
</ul>
<ul>
<li>Review insurance policies: Ensure data-only extortion is covered, not just encryption events. </li>
</ul>
<ul>
<li>Prepare execs and PR: Modern extortion targets reputation and compliance pressure points. </li>
</ul>
<p>Resources &amp; Mentions: </p>
<ul>
<li>https://www.coveware.com/ransomware-quarterly-reports </li>
</ul>
<ul>
<li><a href='https://securityboulevard.com/2025/04/hunters-international-dumps-ransomware-goes-full-on-extortion'>Security Boulevard: Hunters International Rebrands as World Leaks:</a>  </li>
</ul>
<ul>
<li>https://attack.mitre.org/resources/ </li>
</ul>
<ul>
<li><a href='https://lmgsecurity.com/'>LMG Security</a> </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/u4cpe3m7fbi55pv9/CSChats_26albpt-7hewww-Optimized.mp3" length="14926899" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up. 
In this episode, we dive into the rise of data-only extortion campaigns and explore why encryption is becoming optional for cybercriminals. From real-world trends like the rebrand of Hunters International to “World Leaks,” to the strategic impact on insurance, PR, and compliance—this is a wake-up call for security teams everywhere. 
If your playbook still ends with “just restore from backup,” you’re not ready. 
 
Takeaways for Security Teams: 

Rethink detection: Focus on exfiltration, not just malware. 


Update tabletop exercises: Include public leaks, media scrutiny, and regulatory responses. 


Review insurance policies: Ensure data-only extortion is covered, not just encryption events. 


Prepare execs and PR: Modern extortion targets reputation and compliance pressure points. 

Resources &amp; Mentions: 

https://www.coveware.com/ransomware-quarterly-reports 


Security Boulevard: Hunters International Rebrands as World Leaks:  


https://attack.mitre.org/resources/ 


LMG Security 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>895</itunes:duration>
                <itunes:episode>26</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/m3njjrddrxc5etfd/CSChats_26albpt-7hewww-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/nqz8cmrj7v6tmkse/CSChats_26albpt-7hewww-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits</title>
        <itunes:title>The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-echoleak-the-hidden-ai-threat/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-echoleak-the-hidden-ai-threat/#comments</comments>        <pubDate>Tue, 24 Jun 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/03feee92-7b25-33bd-97b5-4ef19407d1a7</guid>
                                    <description><![CDATA[<p>Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into an unintentional insider threat. </p>
<p>They also share a real-world discovery from LMG Security’s pen testing team: how prompt injection was used to extract system prompts and override behavior in a live web application. With examples ranging from corporate chatbots to real-world misfires at Samsung and Chevrolet, this episode unpacks what happens when AI is left untested—and why your security strategy must adapt. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Limit and review the data sources your LLM can access—ensure it doesn’t blindly ingest untrusted content like inbound email, shared docs, or web links. </li>
</ol>
<ol>
<li>Audit AI integrations for prompt injection risks—treat language inputs like code and include them in standard threat models. </li>
</ol>
<ol>
<li>Add prompt injection testing to every web app and email flow assessment, even if you’re using trusted APIs or cloud-hosted models. </li>
</ol>
<ol>
<li>Red-team your LLM tools using subtle, natural-sounding prompts—not just obvious attack phrases. </li>
</ol>
<ol>
<li>Monitor and restrict outbound links from AI-generated content, and validate any use of CSP-approved domains like Microsoft Teams. </li>
</ol>
<p> </p>
<p>Resources </p>
<ul>
<li><a href='https://www.aim.security/lp/aim-labs-echoleak-blogpost'>EchoLeak technical breakdown by Aim Security</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/are-your-ai-backed-web-apps-secure'>LMG Security Blog: Prompt Injection in Web Apps</a> </li>
</ul>
<ul>
<li><a href='https://www.businessinsider.com/car-dealership-chevrolet-chatbot-chatgpt-pranks-chevy-2023-12'>Chevrolet chatbot tricked into $1 car deal</a> </li>
</ul>
<ul>
<li><a href='https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/16/introducing-microsoft-365-copilot-a-whole-new-way-to-work/'>Microsoft 365 Copilot Overview</a> </li>
</ul>
<p>#EchoLeak #Cybersecurity #Cyberaware #CISO #Microsoft #Microsoft365 #Copilot #AI #GenAI #AIsecurity #RiskManagement</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into an unintentional insider threat. </p>
<p>They also share a real-world discovery from LMG Security’s pen testing team: how prompt injection was used to extract system prompts and override behavior in a live web application. With examples ranging from corporate chatbots to real-world misfires at Samsung and Chevrolet, this episode unpacks what happens when AI is left untested—and why your security strategy must adapt. </p>
<p> </p>
<p>Key Takeaways </p>
<ol>
<li>Limit and review the data sources your LLM can access—ensure it doesn’t blindly ingest untrusted content like inbound email, shared docs, or web links. </li>
</ol>
<ol>
<li>Audit AI integrations for prompt injection risks—treat language inputs like code and include them in standard threat models. </li>
</ol>
<ol>
<li>Add prompt injection testing to every web app and email flow assessment, even if you’re using trusted APIs or cloud-hosted models. </li>
</ol>
<ol>
<li>Red-team your LLM tools using subtle, natural-sounding prompts—not just obvious attack phrases. </li>
</ol>
<ol>
<li>Monitor and restrict outbound links from AI-generated content, and validate any use of CSP-approved domains like Microsoft Teams. </li>
</ol>
<p> </p>
<p>Resources </p>
<ul>
<li><a href='https://www.aim.security/lp/aim-labs-echoleak-blogpost'>EchoLeak technical breakdown by Aim Security</a> </li>
</ul>
<ul>
<li><a href='https://www.lmgsecurity.com/are-your-ai-backed-web-apps-secure'>LMG Security Blog: Prompt Injection in Web Apps</a> </li>
</ul>
<ul>
<li><a href='https://www.businessinsider.com/car-dealership-chevrolet-chatbot-chatgpt-pranks-chevy-2023-12'>Chevrolet chatbot tricked into $1 car deal</a> </li>
</ul>
<ul>
<li><a href='https://www.microsoft.com/en-us/microsoft-365/blog/2023/03/16/introducing-microsoft-365-copilot-a-whole-new-way-to-work/'>Microsoft 365 Copilot Overview</a> </li>
</ul>
<p>#EchoLeak #Cybersecurity #Cyberaware #CISO #Microsoft #Microsoft365 #Copilot #AI #GenAI #AIsecurity #RiskManagement</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fa7xwxtutk4trmwn/CSChats_257pu79-d45si8-Optimized.mp3" length="13949866" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into an unintentional insider threat. 
They also share a real-world discovery from LMG Security’s pen testing team: how prompt injection was used to extract system prompts and override behavior in a live web application. With examples ranging from corporate chatbots to real-world misfires at Samsung and Chevrolet, this episode unpacks what happens when AI is left untested—and why your security strategy must adapt. 
 
Key Takeaways 

Limit and review the data sources your LLM can access—ensure it doesn’t blindly ingest untrusted content like inbound email, shared docs, or web links. 


Audit AI integrations for prompt injection risks—treat language inputs like code and include them in standard threat models. 


Add prompt injection testing to every web app and email flow assessment, even if you’re using trusted APIs or cloud-hosted models. 


Red-team your LLM tools using subtle, natural-sounding prompts—not just obvious attack phrases. 


Monitor and restrict outbound links from AI-generated content, and validate any use of CSP-approved domains like Microsoft Teams. 

 
Resources 

EchoLeak technical breakdown by Aim Security 


LMG Security Blog: Prompt Injection in Web Apps 


Chevrolet chatbot tricked into $1 car deal 


Microsoft 365 Copilot Overview 

#EchoLeak #Cybersecurity #Cyberaware #CISO #Microsoft #Microsoft365 #Copilot #AI #GenAI #AIsecurity #RiskManagement]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>834</itunes:duration>
                <itunes:episode>25</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/jv4h23ufcmctgkyb/CSChats_257pu79-d45si8-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/4r8gf95ct5h879v5/CSChats_257pu79-d45si8-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines</title>
        <itunes:title>When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines</itunes:title>
        <link>https://www.chatcyberside.com/e/ai-gone-rogue-from-schemes-to-whistleblowing/</link>
                    <comments>https://www.chatcyberside.com/e/ai-gone-rogue-from-schemes-to-whistleblowing/#comments</comments>        <pubDate>Tue, 17 Jun 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/1f080edf-6501-3274-a6c5-02f0e5c86910</guid>
                                    <description><![CDATA[<p>What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? </p>
<p>Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened users in a disturbing act of self-preservation. These aren’t sci-fi hypotheticals—they’re recent findings from leading AI safety researchers. 
We’ll unpack: </p>
<ul>
<li>The rise of high-agency behavior in LLMs </li>
</ul>
<ul>
<li>The shocking findings from Apollo Research and Anthropic </li>
</ul>
<ul>
<li>What security teams must do to adapt their threat models and controls </li>
</ul>
<ul>
<li>Why trust, verification, and access control now apply to your AI </li>
</ul>
<p>This is essential listening for CISOs, IT leaders, and cybersecurity professionals deploying or assessing AI-powered tools. </p>
<p>Key Takeaways </p>
<ol>
<li>Restrict model access using role-based controls. 
  Limit what AI systems can see and do—apply the principle of least privilege to prompts, data, and tool integrations. </li>
</ol>
<ol>
<li>Monitor and log all AI inputs and outputs. 
  Treat LLM interactions like sensitive API calls: log them, inspect for anomalies, and establish retention policies for auditability. </li>
</ol>
<ol>
<li>Implement output validation for critical tasks. 
  Don’t blindly trust AI decisions—use secondary checks, hashes, or human review for rankings, alerts, or workflow actions. </li>
</ol>
<ol>
<li>Deploy kill-switches outside of model control. 
  Ensure that shutdown or rollback functions are governed by external orchestration—not exposed in the AI’s own prompt space or toolset. </li>
</ol>
<ol>
<li>Add AI behavior reviews to your incident response and risk processes. 
  Red team your models. Include AI behavior in tabletop exercises. Review logs not just for attacks on AI, but misbehavior by AI. </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://arxiv.org/abs/2412.04984'>Apollo Research: Frontier Models Are Capable of In-Context Scheming (arXiv)</a> </li>
</ul>
<ul>
<li><a href='https://www.anthropic.com/news/claude-4-opus-and-sonnet'>Anthropic Claude 4 System Card (PDF)</a> </li>
</ul>
<ul>
<li><a href='https://time.com/7259395/ai-chess-cheating-palisade-research/'>Time Magazine: “When AI Thinks It Will Lose, It Sometimes Cheats”</a> </li>
</ul>
<ul>
<li><a href='https://www.wired.com/story/anthropic-claude-snitch-emergent-behavior/'>WIRED: Claude 4 Whistleblower Behavior</a> </li>
</ul>
<ul>
<li><a href='https://www.researchgate.net/publication/381159261_Deception_abilities_emerged_in_large_language_models'>Deception Abilities in Large Language Models (ResearchGate)</a></li>
</ul>
<p>#AI #GenAI #CISO #Cybersecurity #Cyberaware #Cyber #Infosec #ITsecurity #IT #CEO #RiskManagement</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? </p>
<p>Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened users in a disturbing act of self-preservation. These aren’t sci-fi hypotheticals—they’re recent findings from leading AI safety researchers. <br>
We’ll unpack: </p>
<ul>
<li>The rise of high-agency behavior in LLMs </li>
</ul>
<ul>
<li>The shocking findings from Apollo Research and Anthropic </li>
</ul>
<ul>
<li>What security teams must do to adapt their threat models and controls </li>
</ul>
<ul>
<li>Why trust, verification, and access control now apply to your AI </li>
</ul>
<p>This is essential listening for CISOs, IT leaders, and cybersecurity professionals deploying or assessing AI-powered tools. </p>
<p>Key Takeaways </p>
<ol>
<li>Restrict model access using role-based controls. <br>
  Limit what AI systems can see and do—apply the principle of least privilege to prompts, data, and tool integrations. </li>
</ol>
<ol>
<li>Monitor and log all AI inputs and outputs. <br>
  Treat LLM interactions like sensitive API calls: log them, inspect for anomalies, and establish retention policies for auditability. </li>
</ol>
<ol>
<li>Implement output validation for critical tasks. <br>
  Don’t blindly trust AI decisions—use secondary checks, hashes, or human review for rankings, alerts, or workflow actions. </li>
</ol>
<ol>
<li>Deploy kill-switches <em>outside</em> of model control. <br>
  Ensure that shutdown or rollback functions are governed by external orchestration—not exposed in the AI’s own prompt space or toolset. </li>
</ol>
<ol>
<li>Add AI behavior reviews to your incident response and risk processes. <br>
  Red team your models. Include AI behavior in tabletop exercises. Review logs not just for attacks <em>on</em> AI, but misbehavior <em>by</em> AI. </li>
</ol>
<p>Resources </p>
<ul>
<li><a href='https://arxiv.org/abs/2412.04984'>Apollo Research: Frontier Models Are Capable of In-Context Scheming (arXiv)</a> </li>
</ul>
<ul>
<li><a href='https://www.anthropic.com/news/claude-4-opus-and-sonnet'>Anthropic Claude 4 System Card (PDF)</a> </li>
</ul>
<ul>
<li><a href='https://time.com/7259395/ai-chess-cheating-palisade-research/'>Time Magazine: “When AI Thinks It Will Lose, It Sometimes Cheats”</a> </li>
</ul>
<ul>
<li><a href='https://www.wired.com/story/anthropic-claude-snitch-emergent-behavior/'>WIRED: Claude 4 Whistleblower Behavior</a> </li>
</ul>
<ul>
<li><a href='https://www.researchgate.net/publication/381159261_Deception_abilities_emerged_in_large_language_models'>Deception Abilities in Large Language Models (ResearchGate)</a></li>
</ul>
<p>#AI #GenAI #CISO #Cybersecurity #Cyberaware #Cyber #Infosec #ITsecurity #IT #CEO #RiskManagement</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9b3xzkv4g3zs5ymb/CSChats_24b7096-ijvu4w-Optimized.mp3" length="28708339" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? 
Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened users in a disturbing act of self-preservation. These aren’t sci-fi hypotheticals—they’re recent findings from leading AI safety researchers. We’ll unpack: 

The rise of high-agency behavior in LLMs 


The shocking findings from Apollo Research and Anthropic 


What security teams must do to adapt their threat models and controls 


Why trust, verification, and access control now apply to your AI 

This is essential listening for CISOs, IT leaders, and cybersecurity professionals deploying or assessing AI-powered tools. 
Key Takeaways 

Restrict model access using role-based controls.   Limit what AI systems can see and do—apply the principle of least privilege to prompts, data, and tool integrations. 


Monitor and log all AI inputs and outputs.   Treat LLM interactions like sensitive API calls: log them, inspect for anomalies, and establish retention policies for auditability. 


Implement output validation for critical tasks.   Don’t blindly trust AI decisions—use secondary checks, hashes, or human review for rankings, alerts, or workflow actions. 


Deploy kill-switches outside of model control.   Ensure that shutdown or rollback functions are governed by external orchestration—not exposed in the AI’s own prompt space or toolset. 


Add AI behavior reviews to your incident response and risk processes.   Red team your models. Include AI behavior in tabletop exercises. Review logs not just for attacks on AI, but misbehavior by AI. 

Resources 

Apollo Research: Frontier Models Are Capable of In-Context Scheming (arXiv) 


Anthropic Claude 4 System Card (PDF) 


Time Magazine: “When AI Thinks It Will Lose, It Sometimes Cheats” 


WIRED: Claude 4 Whistleblower Behavior 


Deception Abilities in Large Language Models (ResearchGate)

#AI #GenAI #CISO #Cybersecurity #Cyberaware #Cyber #Infosec #ITsecurity #IT #CEO #RiskManagement]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1587</itunes:duration>
                <itunes:episode>24</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/9mcshvrdwfrng3dq/CSChats_24b7096-ijvu4w-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/cst3bcapkep39v84/CSChats_24b7096-ijvu4w-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Retailgeddon Reloaded: Beyond Card Theft, Into Chaos</title>
        <itunes:title>Retailgeddon Reloaded: Beyond Card Theft, Into Chaos</itunes:title>
        <link>https://www.chatcyberside.com/e/retail-get-in-20-the-new-cybersecurity-challenges-facing-retailers/</link>
                    <comments>https://www.chatcyberside.com/e/retail-get-in-20-the-new-cybersecurity-challenges-facing-retailers/#comments</comments>        <pubDate>Tue, 10 Jun 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/3b0449bc-8fbb-37ff-b367-d75386c2aa26</guid>
                                    <description><![CDATA[<p>Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest retail breach wave, revisit lessons from the 2013 “Retailgeddon” era, and highlight what every security leader — not just in retail — needs to know today.</p>
<p> </p>
<p>Key Takeaways</p>
<ol>
<li>Redefine what “sensitive data” means. Names, emails, and access tokens are often more valuable to attackers than payment data.</li>
<li>Scrutinize third-party and SaaS access. You can’t protect what you don’t know is exposed.</li>
<li>Monitor and protect customer-facing systems. Logging, anomaly detection, and fast response are essential for accounts and APIs — especially when attackers target credentials.</li>
<li>Test your incident response plan for downtime. Retail isn’t the only sector where uptime = revenue and lives impacted.</li>
</ol>
<p>Resources</p>
<p>2025 Verizon Data Breach Investigations Report: <a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></p>
<p>Victoria’s Secret security incident coverage: <a href='https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/'>https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/</a></p>
<p>LMG Security: Third-Party Risk Assessments: <a href='https://lmgsecurity.com/third-party-risk-assessments/'>https://lmgsecurity.com/third-party-risk-assessments/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest retail breach wave, revisit lessons from the 2013 “Retailgeddon” era, and highlight what every security leader — not just in retail — needs to know today.</p>
<p> </p>
<p>Key Takeaways</p>
<ol>
<li>Redefine what “sensitive data” means. Names, emails, and access tokens are often more valuable to attackers than payment data.</li>
<li>Scrutinize third-party and SaaS access. You can’t protect what you don’t know is exposed.</li>
<li>Monitor and protect customer-facing systems. Logging, anomaly detection, and fast response are essential for accounts and APIs — especially when attackers target credentials.</li>
<li>Test your incident response plan for downtime. Retail isn’t the only sector where uptime = revenue and lives impacted.</li>
</ol>
<p>Resources</p>
<p>2025 Verizon Data Breach Investigations Report: <a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></p>
<p>Victoria’s Secret security incident coverage: <a href='https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/'>https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/</a></p>
<p>LMG Security: Third-Party Risk Assessments: <a href='https://lmgsecurity.com/third-party-risk-assessments/'>https://lmgsecurity.com/third-party-risk-assessments/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ktpqznf3kb5sejpq/CSChats_237ku0u-xdt6gt-Optimized.mp3" length="20553550" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest retail breach wave, revisit lessons from the 2013 “Retailgeddon” era, and highlight what every security leader — not just in retail — needs to know today.
 
Key Takeaways

Redefine what “sensitive data” means. Names, emails, and access tokens are often more valuable to attackers than payment data.
Scrutinize third-party and SaaS access. You can’t protect what you don’t know is exposed.
Monitor and protect customer-facing systems. Logging, anomaly detection, and fast response are essential for accounts and APIs — especially when attackers target credentials.
Test your incident response plan for downtime. Retail isn’t the only sector where uptime = revenue and lives impacted.

Resources
2025 Verizon Data Breach Investigations Report: https://www.verizon.com/business/resources/reports/dbir/
Victoria’s Secret security incident coverage: https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/
LMG Security: Third-Party Risk Assessments: https://lmgsecurity.com/third-party-risk-assessments/]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1077</itunes:duration>
                <itunes:episode>23</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/dswn9298kyjjtp47/CSChats_237ku0u-xdt6gt-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/r9kudg8jm63t7mex/CSChats_237ku0u-xdt6gt-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>How Hackers Get In: Penetration Testing Secrets from the Front Line</title>
        <itunes:title>How Hackers Get In: Penetration Testing Secrets from the Front Line</itunes:title>
        <link>https://www.chatcyberside.com/e/unveiling-the-secrets-of-penetration-testing/</link>
                    <comments>https://www.chatcyberside.com/e/unveiling-the-secrets-of-penetration-testing/#comments</comments>        <pubDate>Tue, 03 Jun 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/48177334-04a4-3e46-b551-7c889cad9910</guid>
                                    <description><![CDATA[<p>Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? </p>
<p>Tom shares the most common weak points his team exploits, from insecure default Active Directory settings to overlooked misconfigurations that persist in even the most mature environments. We’ll break down how features like SMB signing, legacy broadcast protocols, and other out-of-the-box settings designed for ease, not security, can quietly open the door for attackers—and what security leaders can do today to shut those doors for good. </p>
<p>Whether you're preparing for your next pentest or hardening your infrastructure against advanced threats, this is a must-watch for CISOs, IT leaders, and anyone responsible for securing Windows networks. </p>
<p> </p>
<p>Takeaways: </p>
<ol>
<li>Eliminate Default Credentials: Regularly audit and replace default logins on network-connected devices, including UPS units, printers, cameras, and other infrastructure. </li>
<li>Harden AD Certificate Services: Review certificate template permissions and AD CS configurations to block known exploitation paths that enable privilege escalation. </li>
<li>Enforce SMB Signing Everywhere: Enable and enforce both client and server SMB signing via Group Policy to prevent authentication relay attacks. </li>
<li>Clean Up File Shares: Scan internal shares for exposed passwords, scripts, and sensitive data, then implement role-based access control by locking down permissions and eliminating unnecessary access.  </li>
<li>Disable Legacy Protocols: Turn off LLMNR, NetBIOS, and similar legacy protocols to reduce the risk of spoofing and name service poisoning attacks. </li>
</ol>
<p> </p>
<p>References: </p>
<p>“Critical Windows Server 2025 DMSA Vulnerability Exposes Enterprises to Domain Compromise” (The Hacker News) </p>
<p><a href='https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html'>https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html</a> </p>
<p>“Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies” (CISA Alert) </p>
<p><a href='https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies'>https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies</a> </p>
<p>LMG Security – Penetration Testing Services (Identify weaknesses before attackers do) </p>
<p><a href='https://www.lmgsecurity.com/services/penetration-testing/'>https://www.lmgsecurity.com/services/penetration-testing/</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Think your network is locked down? Think again. In this episode of <em>Cyberside Chats</em>, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? </p>
<p>Tom shares the most common weak points his team exploits, from insecure default Active Directory settings to overlooked misconfigurations that persist in even the most mature environments. We’ll break down how features like SMB signing, legacy broadcast protocols, and other out-of-the-box settings designed for ease, not security, can quietly open the door for attackers—and what security leaders can do today to shut those doors for good. </p>
<p>Whether you're preparing for your next pentest or hardening your infrastructure against advanced threats, this is a must-watch for CISOs, IT leaders, and anyone responsible for securing Windows networks. </p>
<p> </p>
<p>Takeaways: </p>
<ol>
<li>Eliminate Default Credentials: Regularly audit and replace default logins on network-connected devices, including UPS units, printers, cameras, and other infrastructure. </li>
<li>Harden AD Certificate Services: Review certificate template permissions and AD CS configurations to block known exploitation paths that enable privilege escalation. </li>
<li>Enforce SMB Signing Everywhere: Enable and enforce both client and server SMB signing via Group Policy to prevent authentication relay attacks. </li>
<li>Clean Up File Shares: Scan internal shares for exposed passwords, scripts, and sensitive data, then implement role-based access control by locking down permissions and eliminating unnecessary access.  </li>
<li>Disable Legacy Protocols: Turn off LLMNR, NetBIOS, and similar legacy protocols to reduce the risk of spoofing and name service poisoning attacks. </li>
</ol>
<p> </p>
<p>References: </p>
<p>“Critical Windows Server 2025 DMSA Vulnerability Exposes Enterprises to Domain Compromise” (<em>The Hacker News)</em> </p>
<p><a href='https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html'>https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html</a> </p>
<p>“Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies” (<em>CISA Alert)</em> </p>
<p><a href='https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies'>https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies</a> </p>
<p>LMG Security – Penetration Testing Services (<em>Identify weaknesses before attackers do)</em> </p>
<p><a href='https://www.lmgsecurity.com/services/penetration-testing/'>https://www.lmgsecurity.com/services/penetration-testing/</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i4nxkybn2fyfpa8n/CSChats_226q2s3-8d6x7b-Optimized.mp3" length="28669156" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? 
Tom shares the most common weak points his team exploits, from insecure default Active Directory settings to overlooked misconfigurations that persist in even the most mature environments. We’ll break down how features like SMB signing, legacy broadcast protocols, and other out-of-the-box settings designed for ease, not security, can quietly open the door for attackers—and what security leaders can do today to shut those doors for good. 
Whether you're preparing for your next pentest or hardening your infrastructure against advanced threats, this is a must-watch for CISOs, IT leaders, and anyone responsible for securing Windows networks. 
 
Takeaways: 

Eliminate Default Credentials: Regularly audit and replace default logins on network-connected devices, including UPS units, printers, cameras, and other infrastructure. 
Harden AD Certificate Services: Review certificate template permissions and AD CS configurations to block known exploitation paths that enable privilege escalation. 
Enforce SMB Signing Everywhere: Enable and enforce both client and server SMB signing via Group Policy to prevent authentication relay attacks. 
Clean Up File Shares: Scan internal shares for exposed passwords, scripts, and sensitive data, then implement role-based access control by locking down permissions and eliminating unnecessary access.  
Disable Legacy Protocols: Turn off LLMNR, NetBIOS, and similar legacy protocols to reduce the risk of spoofing and name service poisoning attacks. 

 
References: 
“Critical Windows Server 2025 DMSA Vulnerability Exposes Enterprises to Domain Compromise” (The Hacker News) 
https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html 
“Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies” (CISA Alert) 
https://www.cisa.gov/news-events/alerts/2025/05/21/russian-gru-cyber-actors-targeting-western-logistics-entities-and-tech-companies 
LMG Security – Penetration Testing Services (Identify weaknesses before attackers do) 
https://www.lmgsecurity.com/services/penetration-testing/ ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1584</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>22</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/bgtf8iuk8eyqhd5k/CSChats_226q2s3-8d6x7b-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/ykb6td6uiitmaywb/CSChats_226q2s3-8d6x7b-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Afterlife Access: Cybersecurity Planning for When You’re Gone</title>
        <itunes:title>Afterlife Access: Cybersecurity Planning for When You’re Gone</itunes:title>
        <link>https://www.chatcyberside.com/e/navigating-your-digital-afterlife-ensuring-access-after-youre-gone/</link>
                    <comments>https://www.chatcyberside.com/e/navigating-your-digital-afterlife-ensuring-access-after-youre-gone/#comments</comments>        <pubDate>Tue, 27 May 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/dfa3552b-416b-38ec-957b-d2e0ecf65342</guid>
                                    <description><![CDATA[<p>What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. </p>
<p>Takeaways </p>
<p>1) Take a Digital Inventory of Your Assets </p>
<ul>
<li>Include details like account recovery options, two-factor authentication settings, and related devices. </li>
</ul>
<ul>
<li>Update the inventory regularly and store it securely. </li>
</ul>
<ul>
<li>Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions. </li>
</ul>
<p>2) Implement Emergency Access Protocols in Password Managers </p>
<ul>
<li>Use features like 1Password’s Emergency Kit or designate trusted emergency contacts. </li>
</ul>
<ul>
<li>Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents. </li>
</ul>
<ul>
<li>Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents.</li>
</ul>
<p>3) Establish a Digital Executor </p>
<ul>
<li>Choose a trusted individual to manage your digital assets after death or incapacitation. </li>
</ul>
<ul>
<li>Document access instructions and store them securely, such as in an encrypted file with a shared key. </li>
</ul>
<ul>
<li>Ensure your digital executor knows where these instructions are located—or give them a copy in advance. </li>
</ul>
<p>4) Prepare Recovery Access for Critical Devices </p>
<ul>
<li>Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals. </li>
</ul>
<ul>
<li>Register a Legacy Contact for Apple and other cloud services. </li>
</ul>
<p>5) Create a Plan for Your Online Presence </p>
<ul>
<li>Decide whether your social media and email accounts should be memorialized, deleted, or handed over. </li>
</ul>
<ul>
<li>Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature. </li>
</ul>
<p>6) At Work, Develop Internal Organizational Policies </p>
<ul>
<li>Implement IT procedures for handling the death or incapacity of key personnel. </li>
</ul>
<ul>
<li>Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios. </li>
</ul>
<p> </p>
<p>References: </p>
<p>How to Add a Legacy Contact for Your Apple Account: <a href='https://support.apple.com/en-us/102631'>https://support.apple.com/en-us/102631</a> </p>
<p>Get To Know Your Emergency Kit: <a href='https://support.1password.com/emergency-kit/'>https://support.1password.com/emergency-kit/</a>  </p>
<p>Wayne Crowder’s LinkedIn Page: <a href='https://www.linkedin.com/in/wcrowder'>https://www.linkedin.com/in/wcrowder</a> </p>
<p>Digital Afterlife Planning Checklist: <a href='https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/'>https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/</a> </p>
<p>#Cybersecurity #Cyberaware #Cyber #DigitalPlanning</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens to your digital world when you die? In this episode of <em>Cyberside Chats</em>, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. </p>
<p>Takeaways </p>
<p>1) Take a Digital Inventory of Your Assets </p>
<ul>
<li>Include details like account recovery options, two-factor authentication settings, and related devices. </li>
</ul>
<ul>
<li>Update the inventory regularly and store it securely. </li>
</ul>
<ul>
<li>Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions. </li>
</ul>
<p>2) Implement Emergency Access Protocols in Password Managers </p>
<ul>
<li>Use features like 1Password’s Emergency Kit or designate trusted emergency contacts. </li>
</ul>
<ul>
<li>Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents. </li>
</ul>
<ul>
<li>Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents.</li>
</ul>
<p>3) Establish a Digital Executor </p>
<ul>
<li>Choose a trusted individual to manage your digital assets after death or incapacitation. </li>
</ul>
<ul>
<li>Document access instructions and store them securely, such as in an encrypted file with a shared key. </li>
</ul>
<ul>
<li>Ensure your digital executor knows where these instructions are located—or give them a copy in advance. </li>
</ul>
<p>4) Prepare Recovery Access for Critical Devices </p>
<ul>
<li>Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals. </li>
</ul>
<ul>
<li>Register a Legacy Contact for Apple and other cloud services. </li>
</ul>
<p>5) Create a Plan for Your Online Presence </p>
<ul>
<li>Decide whether your social media and email accounts should be memorialized, deleted, or handed over. </li>
</ul>
<ul>
<li>Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature. </li>
</ul>
<p>6) At Work, Develop Internal Organizational Policies </p>
<ul>
<li>Implement IT procedures for handling the death or incapacity of key personnel. </li>
</ul>
<ul>
<li>Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios. </li>
</ul>
<p> </p>
<p>References: </p>
<p>How to Add a Legacy Contact for Your Apple Account: <a href='https://support.apple.com/en-us/102631'>https://support.apple.com/en-us/102631</a> </p>
<p>Get To Know Your Emergency Kit: <a href='https://support.1password.com/emergency-kit/'>https://support.1password.com/emergency-kit/</a>  </p>
<p>Wayne Crowder’s LinkedIn Page: <a href='https://www.linkedin.com/in/wcrowder'>https://www.linkedin.com/in/wcrowder</a> </p>
<p>Digital Afterlife Planning Checklist: <a href='https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/'>https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/</a> </p>
<p>#Cybersecurity #Cyberaware #Cyber #DigitalPlanning</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/k4djfeddjy7m2bc2/CSChats_219llkp-uh4pjy-Optimized.mp3" length="16800824" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. 
Takeaways 
1) Take a Digital Inventory of Your Assets 

Include details like account recovery options, two-factor authentication settings, and related devices. 


Update the inventory regularly and store it securely. 


Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions. 

2) Implement Emergency Access Protocols in Password Managers 

Use features like 1Password’s Emergency Kit or designate trusted emergency contacts. 


Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents. 


Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents.

3) Establish a Digital Executor 

Choose a trusted individual to manage your digital assets after death or incapacitation. 


Document access instructions and store them securely, such as in an encrypted file with a shared key. 


Ensure your digital executor knows where these instructions are located—or give them a copy in advance. 

4) Prepare Recovery Access for Critical Devices 

Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals. 


Register a Legacy Contact for Apple and other cloud services. 

5) Create a Plan for Your Online Presence 

Decide whether your social media and email accounts should be memorialized, deleted, or handed over. 


Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature. 

6) At Work, Develop Internal Organizational Policies 

Implement IT procedures for handling the death or incapacity of key personnel. 


Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios. 

 
References: 
How to Add a Legacy Contact for Your Apple Account: https://support.apple.com/en-us/102631 
Get To Know Your Emergency Kit: https://support.1password.com/emergency-kit/  
Wayne Crowder’s LinkedIn Page: https://www.linkedin.com/in/wcrowder 
Digital Afterlife Planning Checklist: https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/ 
#Cybersecurity #Cyberaware #Cyber #DigitalPlanning]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1012</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>21</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/wph8xfbga6c3bs4g/CSChats_219llkp-uh4pjy-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/879wi44zcshhiwpp/CSChats_219llkp-uh4pjy-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The LockBit Leak: When Hackers Get a Taste of Their Own Medicine</title>
        <itunes:title>The LockBit Leak: When Hackers Get a Taste of Their Own Medicine</itunes:title>
        <link>https://www.chatcyberside.com/e/lockbits-own-medicine-when-hackers-get-hacked/</link>
                    <comments>https://www.chatcyberside.com/e/lockbits-own-medicine-when-hackers-get-hacked/#comments</comments>        <pubDate>Tue, 20 May 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/e296b25b-1e01-3207-a1ee-46bf13e53632</guid>
                                    <description><![CDATA[<p>In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization. Whether you’re an incident responder or just love cyber drama, this episode delivers. </p>
<p>Takeaways </p>
<ul>
<li>Stay Tuned for Analysis of LockBit’s Dump: The leak could reshape best practices for negotiations and ransom response. More revelations are expected as researchers dive deeper. </li>
</ul>
<ul>
<li>Plan for Ransomware: LockBit’s sophisticated infrastructure and quick rebound highlight the need for a solid, regularly updated ransomware response plan. </li>
</ul>
<ul>
<li>Proactive Measures: Defending against modern ransomware requires: </li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Robust identity and access management </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Secure, offline backups </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Continuous employee training on phishing </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Timely vulnerability patching </li>
</ul>
</li>
</ul>
<ul>
<li>Collaboration and Intelligence Sharing: Work with peers and participate in threat intelligence networks to stay ahead of attackers. </li>
</ul>
<ul>
<li>Test Your Web Applications: LockBit’s breach stemmed from a web panel vulnerability. Regular application testing is essential to avoid similar flaws. </li>
</ul>
<p> Don't forget to like and subscribe for more great cybersecurity content!</p>
<p>Resources </p>
<ul>
<li><a href='https://www.wired.com/story/conti-ransomware-leaks-ukraine/'>Conti Leak Background (Wired)</a> – context on how the Conti gang crumbled after its internal files were leaked </li>
</ul>
<ul>
<li><a href='https://www.nationalcrimeagency.gov.uk/news/global-operation-cronos-strikes-lockbit-ransomware-gang'>Operation Cronos Press Release (UK NCA)</a> – 2024 international takedown of LockBit infrastructure </li>
</ul>
<ul>
<li><a href='https://lmgsecurity.com/blog/'>LMG Security Blog on Ransomware Response</a> – stay updated with expert analysis and tips </li>
</ul>
<p> #LMGsecurity #CybersideChats #Ransomware #LockBit #Databreach #IT #CISO #Cyberaware #Infosec #ITsecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this explosive episode of <em>Cyberside Chats</em>, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization. Whether you’re an incident responder or just love cyber drama, this episode delivers. </p>
<p>Takeaways </p>
<ul>
<li>Stay Tuned for Analysis of LockBit’s Dump: The leak could reshape best practices for negotiations and ransom response. More revelations are expected as researchers dive deeper. </li>
</ul>
<ul>
<li>Plan for Ransomware: LockBit’s sophisticated infrastructure and quick rebound highlight the need for a solid, regularly updated ransomware response plan. </li>
</ul>
<ul>
<li>Proactive Measures: Defending against modern ransomware requires: </li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Robust identity and access management </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Secure, offline backups </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Continuous employee training on phishing </li>
</ul>
</li>
</ul>
<ul>
<li style="list-style-type:none;">
<ul>
<li>Timely vulnerability patching </li>
</ul>
</li>
</ul>
<ul>
<li>Collaboration and Intelligence Sharing: Work with peers and participate in threat intelligence networks to stay ahead of attackers. </li>
</ul>
<ul>
<li>Test Your Web Applications: LockBit’s breach stemmed from a web panel vulnerability. Regular application testing is essential to avoid similar flaws. </li>
</ul>
<p> Don't forget to like and subscribe for more great cybersecurity content!</p>
<p>Resources </p>
<ul>
<li><a href='https://www.wired.com/story/conti-ransomware-leaks-ukraine/'>Conti Leak Background (Wired)</a> – context on how the Conti gang crumbled after its internal files were leaked </li>
</ul>
<ul>
<li><a href='https://www.nationalcrimeagency.gov.uk/news/global-operation-cronos-strikes-lockbit-ransomware-gang'>Operation Cronos Press Release (UK NCA)</a> – 2024 international takedown of LockBit infrastructure </li>
</ul>
<ul>
<li><a href='https://lmgsecurity.com/blog/'>LMG Security Blog on Ransomware Response</a> – stay updated with expert analysis and tips </li>
</ul>
<p> #LMGsecurity #CybersideChats #Ransomware #LockBit #Databreach #IT #CISO #Cyberaware #Infosec #ITsecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9svc33vrhwqcyqum/CSChats_206oj3w-eq5bjv-Optimized.mp3" length="12632335" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization. Whether you’re an incident responder or just love cyber drama, this episode delivers. 
Takeaways 

Stay Tuned for Analysis of LockBit’s Dump: The leak could reshape best practices for negotiations and ransom response. More revelations are expected as researchers dive deeper. 


Plan for Ransomware: LockBit’s sophisticated infrastructure and quick rebound highlight the need for a solid, regularly updated ransomware response plan. 


Proactive Measures: Defending against modern ransomware requires: 




Robust identity and access management 






Secure, offline backups 






Continuous employee training on phishing 






Timely vulnerability patching 




Collaboration and Intelligence Sharing: Work with peers and participate in threat intelligence networks to stay ahead of attackers. 


Test Your Web Applications: LockBit’s breach stemmed from a web panel vulnerability. Regular application testing is essential to avoid similar flaws. 

 Don't forget to like and subscribe for more great cybersecurity content!
Resources 

Conti Leak Background (Wired) – context on how the Conti gang crumbled after its internal files were leaked 


Operation Cronos Press Release (UK NCA) – 2024 international takedown of LockBit infrastructure 


LMG Security Blog on Ransomware Response – stay updated with expert analysis and tips 

 #LMGsecurity #CybersideChats #Ransomware #LockBit #Databreach #IT #CISO #Cyberaware #Infosec #ITsecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>751</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>20</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/tuepnxxqzjjzurnb/CSChats_206oj3w-eq5bjv-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/gcxgdafyt6nbyjsb/CSChats_206oj3w-eq5bjv-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Network for Rent: The Criminal Market Built on Outdated Routers</title>
        <itunes:title>Network for Rent: The Criminal Market Built on Outdated Routers</itunes:title>
        <link>https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/</link>
                    <comments>https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/#comments</comments>        <pubDate>Tue, 13 May 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/f3670d2e-94e7-3608-a659-27c2831c8113</guid>
                                    <description><![CDATA[<p>Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Learn how these botnets work, why they matter for your enterprise, and what to do next. </p>
<p>Takeaways </p>
<ul>
<li>Replace outdated routers 
  End-of-life routers should be identified and replaced across your organization, including remote offices and unmanaged home setups. These devices no longer receive patches and are prime targets for compromise. </li>
</ul>
<ul>
<li>Restrict remote administration 
  If remote access is needed, tightly control it—limit by IP address, use VPN access, and require MFA. Avoid exposing admin interfaces directly to the internet unless absolutely necessary. </li>
</ul>
<ul>
<li>Patch and harden infrastructure 
  Apply all available firmware updates and follow vendor security guidance. Where possible, segment or monitor legacy network devices that can’t be immediately replaced. </li>
</ul>
<ul>
<li>Don’t trust domestic IPs 
  Traffic from domestic or residential IP ranges is no longer inherently safe. Compromised routers make malicious activity appear to come from trusted regions. </li>
</ul>
<ul>
<li>Add proxy abuse to threat intel 
  Incorporate indicators of compromise from Lumen and FBI alerts into detection rulesets. Treat proxy abuse as a key TTP for credential theft, fraud, and malware C2. </li>
<li>Report suspected compromise 
  If you identify affected infrastructure or suspicious traffic, report it to <a href='https://www.ic3.gov/'>IC3.gov</a>. Include IPs, timestamps, device types, and any supporting forensic detail. </li>
</ul>
<p>#CybersideChats #Cybersecurity #Tech #Cyber #CyberAware #CISO #CIO #FBIalert #FBIwarning #Malware #Router</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Learn how these botnets work, why they matter for your enterprise, and what to do next. </p>
<p>Takeaways </p>
<ul>
<li>Replace outdated routers <br>
  End-of-life routers should be identified and replaced across your organization, including remote offices and unmanaged home setups. These devices no longer receive patches and are prime targets for compromise. </li>
</ul>
<ul>
<li>Restrict remote administration <br>
  If remote access is needed, tightly control it—limit by IP address, use VPN access, and require MFA. Avoid exposing admin interfaces directly to the internet unless absolutely necessary. </li>
</ul>
<ul>
<li>Patch and harden infrastructure <br>
  Apply all available firmware updates and follow vendor security guidance. Where possible, segment or monitor legacy network devices that can’t be immediately replaced. </li>
</ul>
<ul>
<li>Don’t trust domestic IPs <br>
  Traffic from domestic or residential IP ranges is no longer inherently safe. Compromised routers make malicious activity appear to come from trusted regions. </li>
</ul>
<ul>
<li>Add proxy abuse to threat intel <br>
  Incorporate indicators of compromise from Lumen and FBI alerts into detection rulesets. Treat proxy abuse as a key TTP for credential theft, fraud, and malware C2. </li>
<li>Report suspected compromise <br>
  If you identify affected infrastructure or suspicious traffic, report it to <a href='https://www.ic3.gov/'>IC3.gov</a>. Include IPs, timestamps, device types, and any supporting forensic detail. </li>
</ul>
<p>#CybersideChats #Cybersecurity #Tech #Cyber #CyberAware #CISO #CIO #FBIalert #FBIwarning #Malware #Router</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/eibzfb22k884izp8/CSChats_1974okm-asccf8-Optimized.mp3" length="9836422" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Learn how these botnets work, why they matter for your enterprise, and what to do next. 
Takeaways 

Replace outdated routers   End-of-life routers should be identified and replaced across your organization, including remote offices and unmanaged home setups. These devices no longer receive patches and are prime targets for compromise. 


Restrict remote administration   If remote access is needed, tightly control it—limit by IP address, use VPN access, and require MFA. Avoid exposing admin interfaces directly to the internet unless absolutely necessary. 


Patch and harden infrastructure   Apply all available firmware updates and follow vendor security guidance. Where possible, segment or monitor legacy network devices that can’t be immediately replaced. 


Don’t trust domestic IPs   Traffic from domestic or residential IP ranges is no longer inherently safe. Compromised routers make malicious activity appear to come from trusted regions. 


Add proxy abuse to threat intel   Incorporate indicators of compromise from Lumen and FBI alerts into detection rulesets. Treat proxy abuse as a key TTP for credential theft, fraud, and malware C2. 
Report suspected compromise   If you identify affected infrastructure or suspicious traffic, report it to IC3.gov. Include IPs, timestamps, device types, and any supporting forensic detail. 

#CybersideChats #Cybersecurity #Tech #Cyber #CyberAware #CISO #CIO #FBIalert #FBIwarning #Malware #Router]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>577</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>19</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/rvnhysds2f6jjf3d/CSChats_1974okm-asccf8-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/thge3dfvsdbiiskv/CSChats_1974okm-asccf8-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes</title>
        <itunes:title>Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes</itunes:title>
        <link>https://www.chatcyberside.com/e/ai-in-cybercrime-how-hackers-exploit-artificial-intelligence/</link>
                    <comments>https://www.chatcyberside.com/e/ai-in-cybercrime-how-hackers-exploit-artificial-intelligence/#comments</comments>        <pubDate>Tue, 06 May 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/422c3062-e03b-3946-8f05-6367a32ec695</guid>
                                    <description><![CDATA[<p>AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. </p>
<p>In this engaging and eye-opening session, Sherri and Matt share how hackers are using AI tools in the wild—often with frightening success. You'll also hear about original research in which we obtained generative AI tools from underground markets, including WormGPT, and tested their ability to identify vulnerabilities and create working exploits. </p>
<p>You’ll walk away with practical, field-tested defense strategies your team can implement immediately. </p>
<p>Takeaways: </p>
<ul>
<li>Deploy AI Defensively: Use AI-powered tools for email filtering, behavioral monitoring, and anomaly detection to keep pace with attackers leveraging generative AI for phishing, impersonation, and malware obfuscation. </li>
</ul>
<ul>
<li>Enhance Executive Protection Protocols: Implement verification procedures for high-risk communications—especially voice and video—to mitigate deepfake and real-time impersonation threats. </li>
</ul>
<ul>
<li>Prioritize Recon Risk Reduction: Minimize publicly available details about internal systems and personnel, which attackers can scrape and analyze using AI for more targeted and convincing attacks. </li>
</ul>
<ul>
<li>Adapt Third-Party Risk Management: Update vendor vetting and due diligence processes to ensure your software providers are proactively using AI to identify vulnerabilities, harden code, and detect malicious behaviors early. </li>
</ul>
<ul>
<li>Train Your Team on AI Threat Awareness: Educate staff on recognizing AI-enhanced phishing, scam scripts, and impersonation attempts—including across multiple languages and perfect grammar. </li>
</ul>
<ul>
<li>Update Incident Response Plans: Ensure your IR playbooks account for faster-moving threats, including AI-discovered zero-days, synthetic media like deepfakes, and AI-assisted exploit development and targeting. </li>
</ul>
<p> </p>
<p>References: </p>
<ul>
<li>"WormGPT Easily Finds Software Vulnerabilities” <a href='https://www.lmgsecurity.com/videos/wormgpt-easily-finds-software-vulnerabilities'>https://www.lmgsecurity.com/videos/wormgpt-easily-finds-software-vulnerabilities</a> </li>
</ul>
<ul>
<li>AI Will Increase the Quantity—and Quality—of Phishing Scams: <a href='https://hbr.org/2024/05/ai-will-increase-the-quantity-and-quality-of-phishing-scams'>https://hbr.org/2024/05/ai-will-increase-the-quantity-and-quality-of-phishing-scams </a></li>
</ul>
<ul>
<li>A Voice Deepfake Was Used To Scam A CEO Out Of $243,000: <a href='https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000'>https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000 </a></li>
</ul>
<p> #ai #aisecurity #aihacks #aihacking #aihack #wormgpt #cybercrime #cyberthreats #ciso #itsecurity </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. </p>
<p>In this engaging and eye-opening session, Sherri and Matt share how hackers are using AI tools in the wild—often with frightening success. You'll also hear about original research in which we obtained generative AI tools from underground markets, including WormGPT, and tested their ability to identify vulnerabilities and create working exploits. </p>
<p>You’ll walk away with practical, field-tested defense strategies your team can implement immediately. </p>
<p>Takeaways: </p>
<ul>
<li>Deploy AI Defensively: Use AI-powered tools for email filtering, behavioral monitoring, and anomaly detection to keep pace with attackers leveraging generative AI for phishing, impersonation, and malware obfuscation. </li>
</ul>
<ul>
<li>Enhance Executive Protection Protocols: Implement verification procedures for high-risk communications—especially voice and video—to mitigate deepfake and real-time impersonation threats. </li>
</ul>
<ul>
<li>Prioritize Recon Risk Reduction: Minimize publicly available details about internal systems and personnel, which attackers can scrape and analyze using AI for more targeted and convincing attacks. </li>
</ul>
<ul>
<li>Adapt Third-Party Risk Management: Update vendor vetting and due diligence processes to ensure your software providers are proactively using AI to identify vulnerabilities, harden code, and detect malicious behaviors early. </li>
</ul>
<ul>
<li>Train Your Team on AI Threat Awareness: Educate staff on recognizing AI-enhanced phishing, scam scripts, and impersonation attempts—including across multiple languages and perfect grammar. </li>
</ul>
<ul>
<li>Update Incident Response Plans: Ensure your IR playbooks account for faster-moving threats, including AI-discovered zero-days, synthetic media like deepfakes, and AI-assisted exploit development and targeting. </li>
</ul>
<p> </p>
<p>References: </p>
<ul>
<li>"WormGPT Easily Finds Software Vulnerabilities” <a href='https://www.lmgsecurity.com/videos/wormgpt-easily-finds-software-vulnerabilities'>https://www.lmgsecurity.com/videos/wormgpt-easily-finds-software-vulnerabilities</a> </li>
</ul>
<ul>
<li>AI Will Increase the Quantity—and Quality—of Phishing Scams: <a href='https://hbr.org/2024/05/ai-will-increase-the-quantity-and-quality-of-phishing-scams'>https://hbr.org/2024/05/ai-will-increase-the-quantity-and-quality-of-phishing-scams </a></li>
</ul>
<ul>
<li>A Voice Deepfake Was Used To Scam A CEO Out Of $243,000: <a href='https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000'>https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000 </a></li>
</ul>
<p> #ai #aisecurity #aihacks #aihacking #aihack #wormgpt #cybercrime #cyberthreats #ciso #itsecurity </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/864c2fxevvwzp6x4/CSChats_1886ayu-nwwbr9-Optimized.mp3" length="19322115" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. 
In this engaging and eye-opening session, Sherri and Matt share how hackers are using AI tools in the wild—often with frightening success. You'll also hear about original research in which we obtained generative AI tools from underground markets, including WormGPT, and tested their ability to identify vulnerabilities and create working exploits. 
You’ll walk away with practical, field-tested defense strategies your team can implement immediately. 
Takeaways: 

Deploy AI Defensively: Use AI-powered tools for email filtering, behavioral monitoring, and anomaly detection to keep pace with attackers leveraging generative AI for phishing, impersonation, and malware obfuscation. 


Enhance Executive Protection Protocols: Implement verification procedures for high-risk communications—especially voice and video—to mitigate deepfake and real-time impersonation threats. 


Prioritize Recon Risk Reduction: Minimize publicly available details about internal systems and personnel, which attackers can scrape and analyze using AI for more targeted and convincing attacks. 


Adapt Third-Party Risk Management: Update vendor vetting and due diligence processes to ensure your software providers are proactively using AI to identify vulnerabilities, harden code, and detect malicious behaviors early. 


Train Your Team on AI Threat Awareness: Educate staff on recognizing AI-enhanced phishing, scam scripts, and impersonation attempts—including across multiple languages and perfect grammar. 


Update Incident Response Plans: Ensure your IR playbooks account for faster-moving threats, including AI-discovered zero-days, synthetic media like deepfakes, and AI-assisted exploit development and targeting. 

 
References: 

"WormGPT Easily Finds Software Vulnerabilities” https://www.lmgsecurity.com/videos/wormgpt-easily-finds-software-vulnerabilities 


AI Will Increase the Quantity—and Quality—of Phishing Scams: https://hbr.org/2024/05/ai-will-increase-the-quantity-and-quality-of-phishing-scams 


A Voice Deepfake Was Used To Scam A CEO Out Of $243,000: https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000 

 #ai #aisecurity #aihacks #aihacking #aihack #wormgpt #cybercrime #cyberthreats #ciso #itsecurity 
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1169</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>18</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/irb2e498qy43snda/CSChats_1886ayu-nwwbr9-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/xayjkcs39cutbj96/CSChats_1886ayu-nwwbr9-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Quantum Shift: How Cybersecurity Must Evolve Now</title>
        <itunes:title>Quantum Shift: How Cybersecurity Must Evolve Now</itunes:title>
        <link>https://www.chatcyberside.com/e/quantum-apocalypse-navigating-cybersecurity-in-the-quantum-era/</link>
                    <comments>https://www.chatcyberside.com/e/quantum-apocalypse-navigating-cybersecurity-in-the-quantum-era/#comments</comments>        <pubDate>Tue, 29 Apr 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/6c36748f-f522-3f6c-85fd-df2be7774d0c</guid>
                                    <description><![CDATA[<p>Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cryptography, our experts will explain what security pros and IT teams need to know now. You'll walk away with a clear understanding of the risks, timelines, and concrete steps your organization can take today to stay ahead of the curve. </p>
<p> </p>
<p>Takeaways &amp; How to Prepare for Quantum Computing: </p>
<ol>
<li>Map Your Crypto Use Today 
Inventory where you use RSA, ECC, and digital signatures across your organization. This is the first step toward identifying high-risk systems and planning your migration strategy. </li>
</ol>
<ol>
<li>Ask Vendors the Right Questions 
Engage vendors now about their crypto agility and post-quantum readiness. Don’t wait for them to tell you—ask what they're doing to prepare and when they'll support PQC standards. </li>
</ol>
<ol>
<li>Protect Long-Term Confidential Data 
Identify and secure data that must stay private for 10+ years—think HR records, contracts, financials, and customer data. Make sure it’s encrypted using symmetric methods or stored on platforms that can adopt PQC. </li>
</ol>
<ol>
<li>Track PQC Standards and Test Early 
Keep up with NIST's progress and consider pilot testing PQC tools in non-production environments. Testing now reduces surprises later when standards are finalized. </li>
</ol>
<ol>
<li>Start Using Hybrid Crypto Approaches 
Hybrid protocols combine classical and quantum-safe algorithms. They provide an easy starting point to future-proof encryption while retaining backward compatibility. </li>
</ol>
<p>References: </p>
<p>“NIST Releases First 3 Finalized Post-Quantum Encryption Standards” </p>
<p><a href='https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards'>https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards</a> </p>
<p>“You need to prepare for post-quantum cryptography now. Here’s why” </p>
<p><a href='https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why'>https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why</a> </p>
<p>#cyptography #quantum #quantumcomputing #quantumcomputers #cybersecurity #ciso #securityawareness #cyberaware #cyberawareness</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of <em>Cyberside Chats</em>, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cryptography, our experts will explain what security pros and IT teams need to know now. You'll walk away with a clear understanding of the risks, timelines, and concrete steps your organization can take today to stay ahead of the curve. </p>
<p> </p>
<p>Takeaways &amp; How to Prepare for Quantum Computing: </p>
<ol>
<li>Map Your Crypto Use Today <br>
Inventory where you use RSA, ECC, and digital signatures across your organization. This is the first step toward identifying high-risk systems and planning your migration strategy. </li>
</ol>
<ol>
<li>Ask Vendors the Right Questions <br>
Engage vendors now about their crypto agility and post-quantum readiness. Don’t wait for them to tell you—ask what they're doing to prepare and when they'll support PQC standards. </li>
</ol>
<ol>
<li>Protect Long-Term Confidential Data <br>
Identify and secure data that must stay private for 10+ years—think HR records, contracts, financials, and customer data. Make sure it’s encrypted using symmetric methods or stored on platforms that can adopt PQC. </li>
</ol>
<ol>
<li>Track PQC Standards and Test Early <br>
Keep up with NIST's progress and consider pilot testing PQC tools in non-production environments. Testing now reduces surprises later when standards are finalized. </li>
</ol>
<ol>
<li>Start Using Hybrid Crypto Approaches <br>
Hybrid protocols combine classical and quantum-safe algorithms. They provide an easy starting point to future-proof encryption while retaining backward compatibility. </li>
</ol>
<p>References: </p>
<p>“NIST Releases First 3 Finalized Post-Quantum Encryption Standards” </p>
<p><a href='https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards'>https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards</a> </p>
<p>“You need to prepare for post-quantum cryptography now. Here’s why” </p>
<p><a href='https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why'>https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why</a> </p>
<p>#cyptography #quantum #quantumcomputing #quantumcomputers #cybersecurity #ciso #securityawareness #cyberaware #cyberawareness</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/reghraff6eixmz3c/CSChats_176ft7o-z6zhyh-Optimized.mp3" length="20460930" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cryptography, our experts will explain what security pros and IT teams need to know now. You'll walk away with a clear understanding of the risks, timelines, and concrete steps your organization can take today to stay ahead of the curve. 
 
Takeaways &amp; How to Prepare for Quantum Computing: 

Map Your Crypto Use Today Inventory where you use RSA, ECC, and digital signatures across your organization. This is the first step toward identifying high-risk systems and planning your migration strategy. 


Ask Vendors the Right Questions Engage vendors now about their crypto agility and post-quantum readiness. Don’t wait for them to tell you—ask what they're doing to prepare and when they'll support PQC standards. 


Protect Long-Term Confidential Data Identify and secure data that must stay private for 10+ years—think HR records, contracts, financials, and customer data. Make sure it’s encrypted using symmetric methods or stored on platforms that can adopt PQC. 


Track PQC Standards and Test Early Keep up with NIST's progress and consider pilot testing PQC tools in non-production environments. Testing now reduces surprises later when standards are finalized. 


Start Using Hybrid Crypto Approaches Hybrid protocols combine classical and quantum-safe algorithms. They provide an easy starting point to future-proof encryption while retaining backward compatibility. 

References: 
“NIST Releases First 3 Finalized Post-Quantum Encryption Standards” 
https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards 
“You need to prepare for post-quantum cryptography now. Here’s why” 
https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why 
#cyptography #quantum #quantumcomputing #quantumcomputers #cybersecurity #ciso #securityawareness #cyberaware #cyberawareness]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1241</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>17</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/hez45stnm4dy5san/CSChats_176ft7o-z6zhyh-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/a2xbmupiecge4eya/CSChats_176ft7o-z6zhyh-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Red Alert: CISA's Budget Cuts and the Fallout for Defenders</title>
        <itunes:title>Red Alert: CISA's Budget Cuts and the Fallout for Defenders</itunes:title>
        <link>https://www.chatcyberside.com/e/cisa-funding-cuts-what-does-it-mean-for-our-cybersecurity/</link>
                    <comments>https://www.chatcyberside.com/e/cisa-funding-cuts-what-does-it-mean-for-our-cybersecurity/#comments</comments>        <pubDate>Tue, 22 Apr 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/8c85d917-c011-39cb-b2ba-a69bf0d08655</guid>
                                    <description><![CDATA[<p>CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of Cyberside Chats, we unpack what’s been cut, how it impacts proactive services like free risk assessments and scanning, and what your organization should do to stay ahead. </p>
<p>Takeaways: </p>
<ul>
<li>Don’t wait for Washington—assume support from CISA and ISACs may be slower or scaled back. </li>
</ul>
<ul>
<li>Map your dependencies on CISA services and plan alternatives for scans, intel, and assessments. </li>
</ul>
<ul>
<li>Budget for gaps—prepare to replace free services with commercial or internal resources. </li>
</ul>
<ul>
<li>Subscribe to non-government threat intelligence feeds and monitor them regularly. </li>
</ul>
<ul>
<li>Prioritize and prepare your response to zero-days and software exploits, knowing CVE and intel delays give attackers more time. </li>
</ul>
<ul>
<li>Build local and sector connections to share threat info informally if national channels slow down. </li>
</ul>
<p>Resources: </p>
<p>MITRE CVE Program - The central hub for CVE IDs, program background, and tracking published vulnerabilities. 
<a href='https://www.cve.org/'>https://www.cve.org</a> </p>
<p>The CVE Foundation: <a href='https://www.thecvefoundation.org/home'>https://www.thecvefoundation.org/home</a>  </p>
<p>LMG Security Vulnerability Scanning: <a href='https://www.lmgsecurity.com/services/testing/vulnerability-scans'>https://www.lmgsecurity.com/services/testing/vulnerability-scans</a> </p>
<p>#cybersecurity #cyber #CVE #riskmanagement #infosec #ciso #security</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of <em>Cyberside Chats</em>, we unpack what’s been cut, how it impacts proactive services like free risk assessments and scanning, and what your organization should do to stay ahead. </p>
<p>Takeaways: </p>
<ul>
<li>Don’t wait for Washington—assume support from CISA and ISACs may be slower or scaled back. </li>
</ul>
<ul>
<li>Map your dependencies on CISA services and plan alternatives for scans, intel, and assessments. </li>
</ul>
<ul>
<li>Budget for gaps—prepare to replace free services with commercial or internal resources. </li>
</ul>
<ul>
<li>Subscribe to non-government threat intelligence feeds and monitor them regularly. </li>
</ul>
<ul>
<li>Prioritize and prepare your response to zero-days and software exploits, knowing CVE and intel delays give attackers more time. </li>
</ul>
<ul>
<li>Build local and sector connections to share threat info informally if national channels slow down. </li>
</ul>
<p>Resources: </p>
<p>MITRE CVE Program - The central hub for CVE IDs, program background, and tracking published vulnerabilities. <br>
<a href='https://www.cve.org/'>https://www.cve.org</a> </p>
<p>The CVE Foundation: <a href='https://www.thecvefoundation.org/home'>https://www.thecvefoundation.org/home</a>  </p>
<p>LMG Security Vulnerability Scanning: <a href='https://www.lmgsecurity.com/services/testing/vulnerability-scans'>https://www.lmgsecurity.com/services/testing/vulnerability-scans</a> </p>
<p>#cybersecurity #cyber #CVE #riskmanagement #infosec #ciso #security</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/yzbi68b95dh82ac3/CSChats_16-MP38albo-25qxpf-Optimized.mp3" length="15984327" type="audio/mpeg"/>
        <itunes:summary><![CDATA[CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of Cyberside Chats, we unpack what’s been cut, how it impacts proactive services like free risk assessments and scanning, and what your organization should do to stay ahead. 
Takeaways: 

Don’t wait for Washington—assume support from CISA and ISACs may be slower or scaled back. 


Map your dependencies on CISA services and plan alternatives for scans, intel, and assessments. 


Budget for gaps—prepare to replace free services with commercial or internal resources. 


Subscribe to non-government threat intelligence feeds and monitor them regularly. 


Prioritize and prepare your response to zero-days and software exploits, knowing CVE and intel delays give attackers more time. 


Build local and sector connections to share threat info informally if national channels slow down. 

Resources: 
MITRE CVE Program - The central hub for CVE IDs, program background, and tracking published vulnerabilities. https://www.cve.org 
The CVE Foundation: https://www.thecvefoundation.org/home  
LMG Security Vulnerability Scanning: https://www.lmgsecurity.com/services/testing/vulnerability-scans 
#cybersecurity #cyber #CVE #riskmanagement #infosec #ciso #security]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>961</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>16</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/ak5g42jfr3cjem2c/CSChats_16-MP38albo-25qxpf-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/bn79v4tbrdv7ccis/CSChats_16-MP38albo-25qxpf-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>23andMe: Breaches, Bankruptcy, and Security</title>
        <itunes:title>23andMe: Breaches, Bankruptcy, and Security</itunes:title>
        <link>https://www.chatcyberside.com/e/privacy-at-risk-the-23andme-data-breach-uncovered/</link>
                    <comments>https://www.chatcyberside.com/e/privacy-at-risk-the-23andme-data-breach-uncovered/#comments</comments>        <pubDate>Tue, 15 Apr 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/4a5a68b1-e3db-336d-8742-c619ab8ebd5f</guid>
                                    <description><![CDATA[<p>When a company built on sensitive data collapses, what happens to the information it collected? In this episode of Cyberside Chats, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—and what should corporate security leaders do differently? </p>
<p>Drawing from past and present breaches, we offer a roadmap for corporate resilience. Learn practical steps for protecting your data when your vendors can’t protect themselves. </p>
<p> </p>
<p>#Cybersecurity #Databreach #23andMe #CISO #IT #ITsecurity #infosec #DFIR #Privacy #RiskManagement</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When a company built on sensitive data collapses, what happens to the information it collected? In this episode of <em>Cyberside Chats</em>, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—and what should corporate security leaders do differently? </p>
<p>Drawing from past and present breaches, we offer a roadmap for corporate resilience. Learn practical steps for protecting your data when your vendors can’t protect themselves. </p>
<p> </p>
<p>#Cybersecurity #Databreach #23andMe #CISO #IT #ITsecurity #infosec #DFIR #Privacy #RiskManagement</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wufyc8bgqbch9qzq/CSChats_1593omk-tiw28j-Optimized.mp3" length="13767946" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When a company built on sensitive data collapses, what happens to the information it collected? In this episode of Cyberside Chats, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—and what should corporate security leaders do differently? 
Drawing from past and present breaches, we offer a roadmap for corporate resilience. Learn practical steps for protecting your data when your vendors can’t protect themselves. 
 
#Cybersecurity #Databreach #23andMe #CISO #IT #ITsecurity #infosec #DFIR #Privacy #RiskManagement]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>822</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>15</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/aynbhgzmms5x6hbi/CSChats_1593omk-tiw28j-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/xgn4pxxyrugspuyj/CSChats_1593omk-tiw28j-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"</title>
        <itunes:title>"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-shadow-it-navigating-unauthorized-communication-tools/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-shadow-it-navigating-unauthorized-communication-tools/#comments</comments>        <pubDate>Tue, 08 Apr 2025 06:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/4b817b4b-6c9c-3d0b-a429-7dfb83cff863</guid>
                                    <description><![CDATA[<p>Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent controversies involving unauthorized communication tools like Signal and Gmail in sensitive governmental contexts. Matt and Karen discuss the risks associated with consumer-grade apps in enterprise environments, the need to balance usability and security, and how organizations can better manage their communication tools to mitigate these risks.</p>
<p>This episode will cover:</p>
<ul>
<li>
<p>What platforms like Signal offer—and their limitations in enterprise settings.</p>
</li>
<li>
<p>Why users bypass official channels and how it leads to compliance failures.</p>
</li>
<li>
<p>Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.</p>
</li>
<li>
<p>The broader shadow IT landscape and why it’s a pressing issue for security leaders.</p>
</li>
</ul>
<p>Join us in exploring the headlines and takeaways that can help organizations avoid similar pitfalls!</p>
<p>#Cybersecurity #ShadowChannels #CybersideChats #UnauthorizedPlatforms #Signal #DataLeaks #Compliance #Infosec #ShadowIT #IT #Cyber #Cyberaware ETech #CISO</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of <em>Cyberside Chats</em>, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent controversies involving unauthorized communication tools like Signal and Gmail in sensitive governmental contexts. Matt and Karen discuss the risks associated with consumer-grade apps in enterprise environments, the need to balance usability and security, and how organizations can better manage their communication tools to mitigate these risks.</p>
<p>This episode will cover:</p>
<ul>
<li>
<p>What platforms like Signal offer—and their limitations in enterprise settings.</p>
</li>
<li>
<p>Why users bypass official channels and how it leads to compliance failures.</p>
</li>
<li>
<p>Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.</p>
</li>
<li>
<p>The broader shadow IT landscape and why it’s a pressing issue for security leaders.</p>
</li>
</ul>
<p>Join us in exploring the headlines and takeaways that can help organizations avoid similar pitfalls!</p>
<p>#Cybersecurity #ShadowChannels #CybersideChats #UnauthorizedPlatforms #Signal #DataLeaks #Compliance #Infosec #ShadowIT #IT #Cyber #Cyberaware ETech #CISO</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cbyjkjcfk4wh9r6m/Cyberside_Chats_Episode_14bfmqk-k4rjfv-Optimized.mp3" length="17478088" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent controversies involving unauthorized communication tools like Signal and Gmail in sensitive governmental contexts. Matt and Karen discuss the risks associated with consumer-grade apps in enterprise environments, the need to balance usability and security, and how organizations can better manage their communication tools to mitigate these risks.
This episode will cover:


What platforms like Signal offer—and their limitations in enterprise settings.


Why users bypass official channels and how it leads to compliance failures.


Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.


The broader shadow IT landscape and why it’s a pressing issue for security leaders.


Join us in exploring the headlines and takeaways that can help organizations avoid similar pitfalls!
#Cybersecurity #ShadowChannels #CybersideChats #UnauthorizedPlatforms #Signal #DataLeaks #Compliance #Infosec #ShadowIT #IT #Cyber #Cyberaware ETech #CISO]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1054</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>14</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/bzwwysk2ir64q8wg/Cyberside_Chats_Episode_14bfmqk-k4rjfv-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/7q4iqhyf7wfaw955/Cyberside_Chats_Episode_14bfmqk-k4rjfv-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The Encryption Battle: Security Savior or Cyber Risk?</title>
        <itunes:title>The Encryption Battle: Security Savior or Cyber Risk?</itunes:title>
        <link>https://www.chatcyberside.com/e/the-encryption-battle-security-savior-or-cyber-risk/</link>
                    <comments>https://www.chatcyberside.com/e/the-encryption-battle-security-savior-or-cyber-risk/#comments</comments>        <pubDate>Tue, 01 Apr 2025 08:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/705a07b7-ab0e-31fa-bdc8-b9c6a615dbc4</guid>
                                    <description><![CDATA[<p>Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies. </p>
<p>Stay informed about how these developments affect corporate data privacy and the evolving landscape of cybersecurity legislation. A must-watch for anyone interested in understanding the complex interplay between technology, privacy, and government control.</p>
<p>#cyberthreats #encryptedcommunications #Apple #encryption #encryptionbackdoors #cybersecurity</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies. </p>
<p>Stay informed about how these developments affect corporate data privacy and the evolving landscape of cybersecurity legislation. A must-watch for anyone interested in understanding the complex interplay between technology, privacy, and government control.</p>
<p>#cyberthreats #encryptedcommunications #Apple #encryption #encryptionbackdoors #cybersecurity</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tq6kcvnf7ratftry/CSChats_13_-_EP_13_03_26_25_MP38k1na-8zw258-Optimized.mp3" length="24972092" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies. 
Stay informed about how these developments affect corporate data privacy and the evolving landscape of cybersecurity legislation. A must-watch for anyone interested in understanding the complex interplay between technology, privacy, and government control.
#cyberthreats #encryptedcommunications #Apple #encryption #encryptionbackdoors #cybersecurity
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1522</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>13</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/7edjpve6smykfx5b/CSChats_13_-_EP_13_03_26_25_MP38k1na-8zw258-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/szei2h8c7f4ss4xz/CSChats_13_-_EP_13_03_26_25_MP38k1na-8zw258-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Deepfakes &amp; Voice Phishing: The New Frontier of Cybercrime</title>
        <itunes:title>Deepfakes &amp; Voice Phishing: The New Frontier of Cybercrime</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-the-future-deepfakes-and-voice-phishing-explored/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-the-future-deepfakes-and-voice-phishing-explored/#comments</comments>        <pubDate>Tue, 25 Mar 2025 08:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/c40db388-3d81-3d68-819f-9afea23aff77</guid>
                                    <description><![CDATA[<p>AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams work and what IT and security leaders can do to protect their organizations. </p>
<p>Takeaways: </p>
<ul>
<li>Educate Staff on Deep Fake &amp; Voice Cloning Threats – Train employees to recognize red flags in AI-generated phishing attempts, including voice calls that sound slightly robotic, rushed password reset requests, and unexpected changes in vendor communications. </li>
</ul>
<ul>
<li>Verify Before You Trust – Encourage employees to independently verify unexpected requests, even if they appear to come from trusted platforms (e.g., YouTube, Apple, Google). Use known contacts, not the contact information in the suspicious message. </li>
</ul>
<ul>
<li>Strengthen MFA Policies – Require phishing-resistant MFA methods (e.g., FIDO2 security keys) and educate users on MFA fatigue attacks, where criminals bombard them with authentication requests to wear them down. </li>
</ul>
<ul>
<li>Limit Publicly Available Information – Reduce exposure by minimizing executives' and employees' personal and professional information online, as attackers use this data to create convincing deepfakes and social engineering schemes. </li>
<li>Monitor Trusted Platforms for Abuse – Attackers are exploiting YouTube, Google Forms, and other legitimate services to distribute phishing content. Set up alerts and regularly review security logs for unusual access attempts or fraudulent messages. </li>
</ul>
<p>Tune in to understand the impact of digital deception and discover practical steps to safeguard against these innovative yet insidious attacks affecting individuals and businesses alike.</p>
<p>#Deepfakes #Phishing #SocialEngineering #CISO #Cyberattacks #VoicePhishing #Cybersecurity #VoiceCloning #CybersideChats</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams work and what IT and security leaders can do to protect their organizations. </p>
<p>Takeaways: </p>
<ul>
<li>Educate Staff on Deep Fake &amp; Voice Cloning Threats – Train employees to recognize red flags in AI-generated phishing attempts, including voice calls that sound slightly robotic, rushed password reset requests, and unexpected changes in vendor communications. </li>
</ul>
<ul>
<li>Verify Before You Trust – Encourage employees to independently verify unexpected requests, even if they appear to come from trusted platforms (e.g., YouTube, Apple, Google). Use known contacts, not the contact information in the suspicious message. </li>
</ul>
<ul>
<li>Strengthen MFA Policies – Require phishing-resistant MFA methods (e.g., FIDO2 security keys) and educate users on MFA fatigue attacks, where criminals bombard them with authentication requests to wear them down. </li>
</ul>
<ul>
<li>Limit Publicly Available Information – Reduce exposure by minimizing executives' and employees' personal and professional information online, as attackers use this data to create convincing deepfakes and social engineering schemes. </li>
<li>Monitor Trusted Platforms for Abuse – Attackers are exploiting YouTube, Google Forms, and other legitimate services to distribute phishing content. Set up alerts and regularly review security logs for unusual access attempts or fraudulent messages. </li>
</ul>
<p>Tune in to understand the impact of digital deception and discover practical steps to safeguard against these innovative yet insidious attacks affecting individuals and businesses alike.</p>
<p>#Deepfakes #Phishing #SocialEngineering #CISO #Cyberattacks #VoicePhishing #Cybersecurity #VoiceCloning #CybersideChats</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xin77mhtm75h5bv6/CSChats_12_-_EP_12_F_v22_-_MP36sg5f-scjm9e-Optimized.mp3" length="13820921" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams work and what IT and security leaders can do to protect their organizations. 
Takeaways: 

Educate Staff on Deep Fake &amp; Voice Cloning Threats – Train employees to recognize red flags in AI-generated phishing attempts, including voice calls that sound slightly robotic, rushed password reset requests, and unexpected changes in vendor communications. 


Verify Before You Trust – Encourage employees to independently verify unexpected requests, even if they appear to come from trusted platforms (e.g., YouTube, Apple, Google). Use known contacts, not the contact information in the suspicious message. 


Strengthen MFA Policies – Require phishing-resistant MFA methods (e.g., FIDO2 security keys) and educate users on MFA fatigue attacks, where criminals bombard them with authentication requests to wear them down. 


Limit Publicly Available Information – Reduce exposure by minimizing executives' and employees' personal and professional information online, as attackers use this data to create convincing deepfakes and social engineering schemes. 
Monitor Trusted Platforms for Abuse – Attackers are exploiting YouTube, Google Forms, and other legitimate services to distribute phishing content. Set up alerts and regularly review security logs for unusual access attempts or fraudulent messages. 

Tune in to understand the impact of digital deception and discover practical steps to safeguard against these innovative yet insidious attacks affecting individuals and businesses alike.
#Deepfakes #Phishing #SocialEngineering #CISO #Cyberattacks #VoicePhishing #Cybersecurity #VoiceCloning #CybersideChats]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>826</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>12</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/yw57zf9k5s2jt5hf/CSChats_12_-_EP_12_F_v22_-_MP36sg5f-scjm9e-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/c8eqvtqqxuvc7nwy/CSChats_12_-_EP_12_F_v22_-_MP36sg5f-scjm9e-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Wiretapped: How Hackers Infiltrated Global Telecom Networks</title>
        <itunes:title>Wiretapped: How Hackers Infiltrated Global Telecom Networks</itunes:title>
        <link>https://www.chatcyberside.com/e/the-title-of-cschats_11_-_ep_11_-_03_07_25_final_v2_mp3abb2v/</link>
                    <comments>https://www.chatcyberside.com/e/the-title-of-cschats_11_-_ep_11_-_03_07_25_final_v2_mp3abb2v/#comments</comments>        <pubDate>Tue, 18 Mar 2025 08:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/cac70950-7993-381a-a35f-b1af09cd2197</guid>
                                    <description><![CDATA[<p>Recent telecom breaches have exposed a critical security risk for businesses everywhere. Nation-state hackers and cybercriminals are stealing metadata, tracking high-profile targets, and even intercepting calls—all without breaking into corporate networks. In this episode, we analyze major telecom hacks, including the Salt Typhoon breach, and share practical strategies for IT leaders to protect their organizations from targeted attacks using telecom data. </p>
<p>Key Takeaways: </p>
<ul>
<li>Strengthen authentication for financial transactions. Don’t rely on the phone!  </li>
</ul>
<ul>
<li>Train staff to recognize spoofed calls and phishing texts that mimic trusted partners. Stay aware – assume telecom metadata can be weaponized </li>
</ul>
<ul>
<li>Limit what employees share over calls and texts. Consider using encrypted communications, such as Signal, for any highly sensitive conversations.  </li>
</ul>
<ul>
<li>Require telecom service providers to disclose security practices and past breaches </li>
</ul>
<ul>
<li>Have a contingency plan for telecom outages, including backup communication channels and alternative ways to verify urgent requests. </li>
</ul>
<p>Don't forget to follow our podcast for fresh, weekly cybersecurity news!</p>
<p>#Cybersecurity #TelecomSecurity #SaltTyphoon #Spoofing #Metadata #Infosec #Phishing #CyberThreats #NationStateHackers #BusinessSecurity #CybersideChats #EncryptedCommunications #ITSecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Recent telecom breaches have exposed a critical security risk for businesses everywhere. Nation-state hackers and cybercriminals are stealing metadata, tracking high-profile targets, and even intercepting calls—all without breaking into corporate networks. In this episode, we analyze major telecom hacks, including the Salt Typhoon breach, and share practical strategies for IT leaders to protect their organizations from targeted attacks using telecom data. </p>
<p>Key Takeaways: </p>
<ul>
<li>Strengthen authentication for financial transactions. Don’t rely on the phone!  </li>
</ul>
<ul>
<li>Train staff to recognize spoofed calls and phishing texts that mimic trusted partners. Stay aware – assume telecom metadata can be weaponized </li>
</ul>
<ul>
<li>Limit what employees share over calls and texts. Consider using encrypted communications, such as Signal, for any highly sensitive conversations.  </li>
</ul>
<ul>
<li>Require telecom service providers to disclose security practices and past breaches </li>
</ul>
<ul>
<li>Have a contingency plan for telecom outages, including backup communication channels and alternative ways to verify urgent requests. </li>
</ul>
<p>Don't forget to follow our podcast for fresh, weekly cybersecurity news!</p>
<p>#Cybersecurity #TelecomSecurity #SaltTyphoon #Spoofing #Metadata #Infosec #Phishing #CyberThreats #NationStateHackers #BusinessSecurity #CybersideChats #EncryptedCommunications #ITSecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/g74x84shwzjzk3a5/CSChats_11_-_EP_11_-_03_07_25_FINAL_v2_MP3abb2v.mp3" length="20699136" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Recent telecom breaches have exposed a critical security risk for businesses everywhere. Nation-state hackers and cybercriminals are stealing metadata, tracking high-profile targets, and even intercepting calls—all without breaking into corporate networks. In this episode, we analyze major telecom hacks, including the Salt Typhoon breach, and share practical strategies for IT leaders to protect their organizations from targeted attacks using telecom data. 
Key Takeaways: 

Strengthen authentication for financial transactions. Don’t rely on the phone!  


Train staff to recognize spoofed calls and phishing texts that mimic trusted partners. Stay aware – assume telecom metadata can be weaponized 


Limit what employees share over calls and texts. Consider using encrypted communications, such as Signal, for any highly sensitive conversations.  


Require telecom service providers to disclose security practices and past breaches 


Have a contingency plan for telecom outages, including backup communication channels and alternative ways to verify urgent requests. 

Don't forget to follow our podcast for fresh, weekly cybersecurity news!
#Cybersecurity #TelecomSecurity #SaltTyphoon #Spoofing #Metadata #Infosec #Phishing #CyberThreats #NationStateHackers #BusinessSecurity #CybersideChats #EncryptedCommunications #ITSecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>894</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>11</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/2tnhu996bj6vqka7/CSChats_11_-_EP_11_-_03_07_25_FINAL_v2_MP3abb2v-5bqqge-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/wurxsgzhuarfsxau/CSChats_11_-_EP_11_-_03_07_25_FINAL_v2_MP3abb2v_chapters.json" type="application/json" />    </item>
    <item>
        <title>When Microsoft Goes Down: Cyber Risk &amp; Resilience</title>
        <itunes:title>When Microsoft Goes Down: Cyber Risk &amp; Resilience</itunes:title>
        <link>https://www.chatcyberside.com/e/navigating-tech-turbulence-microsoft-outages-and-business-interruption-preparedness/</link>
                    <comments>https://www.chatcyberside.com/e/navigating-tech-turbulence-microsoft-outages-and-business-interruption-preparedness/#comments</comments>        <pubDate>Tue, 11 Mar 2025 08:30:00 -0400</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/73c98697-f02d-3c9c-bb77-74d68b2968bb</guid>
                                    <description><![CDATA[<p>The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&amp;T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption.</p>
<p>Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services.</p>
Actionable Takeaways:
<ul>
<li>Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages.</li>
<li>Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions.</li>
<li>Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making.</li>
<li>Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks.</li>
<li>Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories.</li>
<li>Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider.</li>
</ul>
Links &amp; References:
<ul>
<li><a href='https://www.cnbc.com/2025/03/01/reported-global-microsoft-outage-leaves-tens-of-thousands-unable-to-access-email-and-other-apps.html'>Microsoft’s Global Outage Coverage (CNBC)</a></li>
<li><a href='https://www3.ambest.com/ambv/sales/bwpurchase.aspx?record_code=351765'>Cyber Insurance Report – Business Interruption Trends (AM Best)</a></li>
<li><a href='https://finance.yahoo.com/news/q4-2025-crowdstrike-holdings-inc-132030900.html'>CrowdStrike Q4 2025 Earnings Report</a></li>
<li><a href='https://thetimes.co.uk/'>UK Banking System Outage (The Times)</a></li>
<li><a href='https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf'>World Economic Forum Cybersecurity Outlook 2025</a></li>
</ul>
<p>#microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&amp;T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption.</p>
<p>Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services.</p>
Actionable Takeaways:
<ul>
<li>Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages.</li>
<li>Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions.</li>
<li>Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making.</li>
<li>Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks.</li>
<li>Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories.</li>
<li>Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider.</li>
</ul>
Links &amp; References:
<ul>
<li><a href='https://www.cnbc.com/2025/03/01/reported-global-microsoft-outage-leaves-tens-of-thousands-unable-to-access-email-and-other-apps.html'>Microsoft’s Global Outage Coverage (CNBC)</a></li>
<li><a href='https://www3.ambest.com/ambv/sales/bwpurchase.aspx?record_code=351765'>Cyber Insurance Report – Business Interruption Trends (AM Best)</a></li>
<li><a href='https://finance.yahoo.com/news/q4-2025-crowdstrike-holdings-inc-132030900.html'>CrowdStrike Q4 2025 Earnings Report</a></li>
<li><a href='https://thetimes.co.uk/'>UK Banking System Outage (The Times)</a></li>
<li><a href='https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf'>World Economic Forum Cybersecurity Outlook 2025</a></li>
</ul>
<p>#microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cpjaa4p6zmp9etc8/CSChats_10_-_EP_10_-_03_05_2025_FINAL_v3_MP_auia9-tb7kkx-Optimized.mp3" length="17682389" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&amp;T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption.
Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services.
Actionable Takeaways:

Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages.
Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions.
Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making.
Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks.
Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories.
Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider.

Links &amp; References:

Microsoft’s Global Outage Coverage (CNBC)
Cyber Insurance Report – Business Interruption Trends (AM Best)
CrowdStrike Q4 2025 Earnings Report
UK Banking System Outage (The Times)
World Economic Forum Cybersecurity Outlook 2025

#microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>897</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>10</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/947rksisykspandi/CSChats_10_-_EP_10_-_03_05_2025_FINAL_v3_MP_auia9-tb7kkx-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/6ynv69izkfarvtye/CSChats_10_-_EP_10_-_03_05_2025_FINAL_v3_MP_auia9-tb7kkx-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Abandoned S3 Buckets – A Goldmine for Hackers</title>
        <itunes:title>Abandoned S3 Buckets – A Goldmine for Hackers</itunes:title>
        <link>https://www.chatcyberside.com/e/exploring-the-digital-debris-the-hidden-dangers-of-abandoned-s3-buckets/</link>
                    <comments>https://www.chatcyberside.com/e/exploring-the-digital-debris-the-hidden-dangers-of-abandoned-s3-buckets/#comments</comments>        <pubDate>Tue, 04 Mar 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/086cb864-2d31-3aab-af9d-5cf6b1a00d5f</guid>
                                    <description><![CDATA[<p>Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat!</p>
<p>Links &amp; Resources: </p>
<ul>
<li>Watchtowr’s Research on Abandoned S3 Buckets: <a href='https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/'>https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/</a> </li>
</ul>
<ul>
<li>How Encryption Works by Sherri: <a href='https://www.youtube.com/watch?v=ALsXbShTWJk'>https://www.youtube.com/watch?v=ALsXbShTWJk</a> </li>
</ul>
<ul>
<li>LMG Security’s Cloud Security Audits: <a href='https://www.lmgsecurity.com/services/advisory-compliance/cloud-security-assessment/'>https://www.LMGsecurity.com/services/advisory-compliance/cloud-security-assessment/</a> </li>
</ul>
<p>Like what you heard? Subscribe to Cyberside Chats for more expert cybersecurity insights every week. </p>
<p>#cybersecurity #databreach #AWS #S3 #CISO #Cloud #AWSsecurity #Hackers #Infosec #IncidentResponse</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat!</p>
<p>Links &amp; Resources: </p>
<ul>
<li>Watchtowr’s Research on Abandoned S3 Buckets: <a href='https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/'>https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/</a> </li>
</ul>
<ul>
<li>How Encryption Works by Sherri: <a href='https://www.youtube.com/watch?v=ALsXbShTWJk'>https://www.youtube.com/watch?v=ALsXbShTWJk</a> </li>
</ul>
<ul>
<li>LMG Security’s Cloud Security Audits: <a href='https://www.lmgsecurity.com/services/advisory-compliance/cloud-security-assessment/'>https://www.LMGsecurity.com/services/advisory-compliance/cloud-security-assessment/</a> </li>
</ul>
<p>Like what you heard? Subscribe to Cyberside Chats for more expert cybersecurity insights every week. </p>
<p>#cybersecurity #databreach #AWS #S3 #CISO #Cloud #AWSsecurity #Hackers #Infosec #IncidentResponse</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8x3q655id2eztrmd/CSChats_9_-_EP_9_-_02_26_25_MP3_-_FINAL_v1a9hf3-fu9xcb-Optimized.mp3" length="27659867" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat!
Links &amp; Resources: 

Watchtowr’s Research on Abandoned S3 Buckets: https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/ 


How Encryption Works by Sherri: https://www.youtube.com/watch?v=ALsXbShTWJk 


LMG Security’s Cloud Security Audits: https://www.LMGsecurity.com/services/advisory-compliance/cloud-security-assessment/ 

Like what you heard? Subscribe to Cyberside Chats for more expert cybersecurity insights every week. 
#cybersecurity #databreach #AWS #S3 #CISO #Cloud #AWSsecurity #Hackers #Infosec #IncidentResponse
 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1521</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>9</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/dcw354xwq4rby4ha/CSChats_9_-_EP_9_-_02_26_25_MP3_-_FINAL_v1a9hf3-fu9xcb-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/vudex57i4n7ayfex/CSChats_9_-_EP_9_-_02_26_25_MP3_-_FINAL_v1a9hf3-fu9xcb-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Ransomware Watch: Ghost, RansomHub, and the Latest Trends</title>
        <itunes:title>Ransomware Watch: Ghost, RansomHub, and the Latest Trends</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-the-ghost-ransomwares-global-threat/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-the-ghost-ransomwares-global-threat/#comments</comments>        <pubDate>Tue, 25 Feb 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/6b928326-38b7-302e-ac50-76fa250da078</guid>
                                    <description><![CDATA[<p>In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can fortify their defenses.</p>
<p>We'll also provide insights into the broader ransomware landscape, including trends and statistics for 2024, and offer practical advice on protecting against these cyber threats. Lastly, we delve into the operations of the RansomHub group, revealing their so-called 'ethical' hacking practices.</p>
<p>Join Sherri Davidoff and Matt Durrin as they unravel these cyber threats and equip you with strategies to safeguard your organization.</p>
<p>#ransomware #ransomwareattacks #cybersecurity #cyberaware #GhostRansomware #CISA</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can fortify their defenses.</p>
<p>We'll also provide insights into the broader ransomware landscape, including trends and statistics for 2024, and offer practical advice on protecting against these cyber threats. Lastly, we delve into the operations of the RansomHub group, revealing their so-called 'ethical' hacking practices.</p>
<p>Join Sherri Davidoff and Matt Durrin as they unravel these cyber threats and equip you with strategies to safeguard your organization.</p>
<p>#ransomware #ransomwareattacks #cybersecurity #cyberaware #GhostRansomware #CISA</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nmeaxesbixj4ir4s/CSChats_8_-_EP_8_-_02_20_25_FINAL_v2_-_MP3bq825-e74669-Optimized.mp3" length="14249593" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can fortify their defenses.
We'll also provide insights into the broader ransomware landscape, including trends and statistics for 2024, and offer practical advice on protecting against these cyber threats. Lastly, we delve into the operations of the RansomHub group, revealing their so-called 'ethical' hacking practices.
Join Sherri Davidoff and Matt Durrin as they unravel these cyber threats and equip you with strategies to safeguard your organization.
#ransomware #ransomwareattacks #cybersecurity #cyberaware #GhostRansomware #CISA]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>852</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/7g74dpgd42bvgtq6/CSChats_8_-_EP_8_-_02_20_25_FINAL_v2_-_MP3bq825-e74669-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/wd5qbg64uxsw9i6e/CSChats_8_-_EP_8_-_02_20_25_FINAL_v2_-_MP3bq825-e74669-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Software Exploits – The Fast-Paced Threat Landscape of 2025</title>
        <itunes:title>Software Exploits – The Fast-Paced Threat Landscape of 2025</itunes:title>
        <link>https://www.chatcyberside.com/e/zero-day-vulnerabilities-the-new-normal-for-cybersecurity/</link>
                    <comments>https://www.chatcyberside.com/e/zero-day-vulnerabilities-the-new-normal-for-cybersecurity/#comments</comments>        <pubDate>Tue, 18 Feb 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/88ba6190-5ef4-3ed1-b4da-a6bfcec26075</guid>
                                    <description><![CDATA[<p>Zero-day exploits are hitting faster than ever—are you ready? This week, we dive into the U.S. Treasury breach, which we now know involved multiple zero-days, including a newly discovered flaw in BeyondTrust’s security software. Attackers aren’t just targeting IT systems anymore—they’re coming for security tools themselves to gain privileged access. </p>
<p>We also cover new zero-days in Microsoft, Apple, and Android, and why time-to-exploit has dropped from 32 days to just 5. Plus, we’ll share key defensive strategies to help you stay ahead. </p>
<p>The race between attackers and defenders is accelerating—don’t get left behind. </p>
<p>Takeaways: How You Can Defend Against These Threats </p>
<ul>
<li>Patch Faster—Automate Where Possible 
With zero-days being exploited in days, manual patching isn’t fast enough. Automate patching for high-risk, internet-exposed systems. </li>
</ul>
<ul>
<li>Monitor Known Exploits &amp; Zero-Days 
Stay ahead of threats with the CISA Known Exploited Vulnerabilities Catalog: <a href='https://www.cisa.gov/known-exploited-vulnerabilities-catalog'>https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>. </li>
</ul>
<ul>
<li>Strengthen Privileged Access &amp; Network Segmentation 
Security tools like BeyondTrust are high-value targets—lock them down. Limit exposure: if attackers breach one system, they shouldn’t be able to pivot everywhere. </li>
</ul>
<ul>
<li>Threat Hunt for Exploitation Attempts 
Don’t wait for alerts—assume exploitation is happening. Look for privilege escalations, odd script executions, and unexpected admin account changes. </li>
</ul>
<ul>
<li>Assess &amp; Limit Third-Party Risks 
Security vendors are part of your attack surface—evaluate them like you would any other software provider. Make sure they follow secure development practices, have clear incident response plans, and communicate openly about vulnerabilities and patches.  </li>
</ul>
<p>Helpful Links &amp; Resources </p>
<ul>
<li>CISA Known Exploited Vulnerabilities Catalog: <a href='https://www.cisa.gov/known-exploited-vulnerabilities-catalog'>https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a> 
LMG’s Software Supply Chain Webinar: <a href='https://www.youtube.com/watch?v=cB8iriZJ57k'>https://www.youtube.com/watch?v=cB8iriZJ57k</a> </li>
</ul>
<ul>
<li>Google’s Cybersecurity Forecast 2025 report: <a href='https://cloud.google.com/security/resources/cybersecurity-forecast'>https://cloud.google.com/security/resources/cybersecurity-forecast</a> </li>
</ul>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Zero-day exploits are hitting faster than ever—are you ready? This week, we dive into the U.S. Treasury breach, which we now know involved multiple zero-days, including a newly discovered flaw in BeyondTrust’s security software. Attackers aren’t just targeting IT systems anymore—they’re coming for security tools themselves to gain privileged access. </p>
<p>We also cover new zero-days in Microsoft, Apple, and Android, and why time-to-exploit has dropped from 32 days to just 5. Plus, we’ll share key defensive strategies to help you stay ahead. </p>
<p>The race between attackers and defenders is accelerating—don’t get left behind. </p>
<p>Takeaways: How You Can Defend Against These Threats </p>
<ul>
<li>Patch Faster—Automate Where Possible <br>
With zero-days being exploited in days, manual patching isn’t fast enough. Automate patching for high-risk, internet-exposed systems. </li>
</ul>
<ul>
<li>Monitor Known Exploits &amp; Zero-Days <br>
Stay ahead of threats with the CISA Known Exploited Vulnerabilities Catalog: <a href='https://www.cisa.gov/known-exploited-vulnerabilities-catalog'>https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>. </li>
</ul>
<ul>
<li>Strengthen Privileged Access &amp; Network Segmentation <br>
Security tools like BeyondTrust are high-value targets—lock them down. Limit exposure: if attackers breach one system, they shouldn’t be able to pivot everywhere. </li>
</ul>
<ul>
<li>Threat Hunt for Exploitation Attempts <br>
Don’t wait for alerts—assume exploitation is happening. Look for privilege escalations, odd script executions, and unexpected admin account changes. </li>
</ul>
<ul>
<li>Assess &amp; Limit Third-Party Risks <br>
Security vendors are part of your attack surface—evaluate them like you would any other software provider. Make sure they follow secure development practices, have clear incident response plans, and communicate openly about vulnerabilities and patches.  </li>
</ul>
<p>Helpful Links &amp; Resources </p>
<ul>
<li>CISA Known Exploited Vulnerabilities Catalog: <a href='https://www.cisa.gov/known-exploited-vulnerabilities-catalog'>https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a> <br>
LMG’s Software Supply Chain Webinar: <a href='https://www.youtube.com/watch?v=cB8iriZJ57k'>https://www.youtube.com/watch?v=cB8iriZJ57k</a> </li>
</ul>
<ul>
<li>Google’s Cybersecurity Forecast 2025 report: <a href='https://cloud.google.com/security/resources/cybersecurity-forecast'>https://cloud.google.com/security/resources/cybersecurity-forecast</a> </li>
</ul>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/36ybcpp3rz2wgqth/CSchats_7_-_EP_7_-_02_16_25_-_The_Fast-Paced_Threat_MP3_-_FINAL_v1au80w-xj8wx6-Optimized.mp3" length="12454148" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Zero-day exploits are hitting faster than ever—are you ready? This week, we dive into the U.S. Treasury breach, which we now know involved multiple zero-days, including a newly discovered flaw in BeyondTrust’s security software. Attackers aren’t just targeting IT systems anymore—they’re coming for security tools themselves to gain privileged access. 
We also cover new zero-days in Microsoft, Apple, and Android, and why time-to-exploit has dropped from 32 days to just 5. Plus, we’ll share key defensive strategies to help you stay ahead. 
The race between attackers and defenders is accelerating—don’t get left behind. 
Takeaways: How You Can Defend Against These Threats 

Patch Faster—Automate Where Possible With zero-days being exploited in days, manual patching isn’t fast enough. Automate patching for high-risk, internet-exposed systems. 


Monitor Known Exploits &amp; Zero-Days Stay ahead of threats with the CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog. 


Strengthen Privileged Access &amp; Network Segmentation Security tools like BeyondTrust are high-value targets—lock them down. Limit exposure: if attackers breach one system, they shouldn’t be able to pivot everywhere. 


Threat Hunt for Exploitation Attempts Don’t wait for alerts—assume exploitation is happening. Look for privilege escalations, odd script executions, and unexpected admin account changes. 


Assess &amp; Limit Third-Party Risks Security vendors are part of your attack surface—evaluate them like you would any other software provider. Make sure they follow secure development practices, have clear incident response plans, and communicate openly about vulnerabilities and patches.  

Helpful Links &amp; Resources 

CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog LMG’s Software Supply Chain Webinar: https://www.youtube.com/watch?v=cB8iriZJ57k 


Google’s Cybersecurity Forecast 2025 report: https://cloud.google.com/security/resources/cybersecurity-forecast 

 ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>740</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/zen8wsnxn5yj2c87/CSchats_7_-_EP_7_-_02_16_25_-_The_Fast-Paced_Threat_MP3_-_FINAL_v1au80w-xj8wx6-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/zmx6by59iip2bywr/CSchats_7_-_EP_7_-_02_16_25_-_The_Fast-Paced_Threat_MP3_-_FINAL_v1au80w-xj8wx6-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>The OPM Security Debacle: Rogue Servers, Data Risks &amp; What’s Next</title>
        <itunes:title>The OPM Security Debacle: Rogue Servers, Data Risks &amp; What’s Next</itunes:title>
        <link>https://www.chatcyberside.com/e/rogue-server-at-opm-is-history-repeating-itself/</link>
                    <comments>https://www.chatcyberside.com/e/rogue-server-at-opm-is-history-repeating-itself/#comments</comments>        <pubDate>Tue, 11 Feb 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/66364d79-762f-3d59-875f-dacae02c8c1e</guid>
                                    <description><![CDATA[<p>In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees.</p>
<p>We compare this developing situation to the infamous 2015 OPM hack, in which state-sponsored attackers stole the personal records of over 22 million individuals. Are we witnessing history repeat itself—this time with even more catastrophic consequences?</p>
<p>Topics Covered:</p>
<ul>
<li>Flashback to 2015: How weak security and stolen credentials led to one of the worst data breaches in U.S. history.</li>
<li>The New OPM Scandal: How an unauthorized email server could open the door to ransomware, espionage, and phishing attacks.</li>
<li>Cybersecurity Risks: Data exfiltration, credential theft, security bypassing, and compliance failures.</li>
<li>Lessons for IT Leaders: How to detect rogue devices, enforce Zero Trust policies, and prevent a breach before it happens.</li>
</ul>
<p>If the rogue OPM server isn’t secured, millions of federal employees could face serious risks. Listen to learn more. Do you think history is repeating itself with cybersecurity lapses going unchecked? What do you think? Drop your thoughts in the comments.</p>
<p>Tune in again next Tuesday for another episode of Cyberside Chats! </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees.</p>
<p>We compare this developing situation to the infamous 2015 OPM hack, in which state-sponsored attackers stole the personal records of over 22 million individuals. Are we witnessing history repeat itself—this time with even more catastrophic consequences?</p>
<p>Topics Covered:</p>
<ul>
<li>Flashback to 2015: How weak security and stolen credentials led to one of the worst data breaches in U.S. history.</li>
<li>The New OPM Scandal: How an unauthorized email server could open the door to ransomware, espionage, and phishing attacks.</li>
<li>Cybersecurity Risks: Data exfiltration, credential theft, security bypassing, and compliance failures.</li>
<li>Lessons for IT Leaders: How to detect rogue devices, enforce Zero Trust policies, and prevent a breach before it happens.</li>
</ul>
<p>If the rogue OPM server isn’t secured, millions of federal employees could face serious risks. Listen to learn more. Do you think history is repeating itself with cybersecurity lapses going unchecked? What do you think? Drop your thoughts in the comments.</p>
<p>Tune in again next Tuesday for another episode of Cyberside Chats! </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/puir6yk7hbpeavqm/CSChat_6_-_EP_6_-_02_07_25_-_NAME_NEEDED_FINAL_v2_-_MP3b9lxo-9x8un9-Optimized.mp3" length="16263491" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees.
We compare this developing situation to the infamous 2015 OPM hack, in which state-sponsored attackers stole the personal records of over 22 million individuals. Are we witnessing history repeat itself—this time with even more catastrophic consequences?
Topics Covered:

Flashback to 2015: How weak security and stolen credentials led to one of the worst data breaches in U.S. history.
The New OPM Scandal: How an unauthorized email server could open the door to ransomware, espionage, and phishing attacks.
Cybersecurity Risks: Data exfiltration, credential theft, security bypassing, and compliance failures.
Lessons for IT Leaders: How to detect rogue devices, enforce Zero Trust policies, and prevent a breach before it happens.

If the rogue OPM server isn’t secured, millions of federal employees could face serious risks. Listen to learn more. Do you think history is repeating itself with cybersecurity lapses going unchecked? What do you think? Drop your thoughts in the comments.
Tune in again next Tuesday for another episode of Cyberside Chats! ]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>809</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/uuya5g6cekv5ieb3/CSChat_6_-_EP_6_-_02_07_25_-_NAME_NEEDED_FINAL_v2_-_MP3b9lxo-9x8un9-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/79v98959w2pkfycf/CSChat_6_-_EP_6_-_02_07_25_-_NAME_NEEDED_FINAL_v2_-_MP3b9lxo-9x8un9-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>DeepSeek or Deep Risk? The AI Power Play With China</title>
        <itunes:title>DeepSeek or Deep Risk? The AI Power Play With China</itunes:title>
        <link>https://www.chatcyberside.com/e/deepseek-ai-revolutionary-or-risky/</link>
                    <comments>https://www.chatcyberside.com/e/deepseek-ai-revolutionary-or-risky/#comments</comments>        <pubDate>Tue, 04 Feb 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/b0e7ef52-f24a-39a9-833e-1d9eacbeb699</guid>
                                    <description><![CDATA[<p>DeepSeek or DeepRisk?</p>
<p>A new AI powerhouse is making waves—DeepSeek has skyrocketed in popularity, rivaling top AI models at a fraction of the cost.</p>
<p>But with data stored in China and unknown security safeguards, is your organization at risk? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the cybersecurity implications of AI tools like DeepSeek. You'll learn about:</p>
<p>▪ DeepSeek's unique IP exposure risks and cybersecurity challenges.
▪ The growing threat of "Shadow AI" in your organization and supply chain.
▪ How to update your policies, vet vendors, and protect sensitive data in an era of rapidly evolving AI risks.</p>
<p>Join Sherri and Matt as they provide an in-depth look at DeepSeek's cybersecurity risks and explain why your organization must communicate clear acceptable use policies with employees and partners.</p>
<p>Don’t forget to follow us for weekly Cyberside Chats security updates!</p>
<p>🔗 Here’s the LMG Security AI Readiness Checklist we reference in the video:
<a href='https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates'>https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates</a></p>
<p>#DeepSeek #cybersecurity #cyberaware #cybersecurityawareness #ciso #cybersecure #aithreats #ai #DeepSeekSecurity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>DeepSeek or DeepRisk?</p>
<p>A new AI powerhouse is making waves—DeepSeek has skyrocketed in popularity, rivaling top AI models at a fraction of the cost.</p>
<p>But with data stored in China and unknown security safeguards, is your organization at risk? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the cybersecurity implications of AI tools like DeepSeek. You'll learn about:</p>
<p>▪ DeepSeek's unique IP exposure risks and cybersecurity challenges.<br>
▪ The growing threat of "Shadow AI" in your organization and supply chain.<br>
▪ How to update your policies, vet vendors, and protect sensitive data in an era of rapidly evolving AI risks.</p>
<p>Join Sherri and Matt as they provide an in-depth look at DeepSeek's cybersecurity risks and explain why your organization must communicate clear acceptable use policies with employees and partners.</p>
<p>Don’t forget to follow us for weekly Cyberside Chats security updates!</p>
<p>🔗 Here’s the LMG Security AI Readiness Checklist we reference in the video:<br>
<a href='https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates'>https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates</a></p>
<p>#DeepSeek #cybersecurity #cyberaware #cybersecurityawareness #ciso #cybersecure #aithreats #ai #DeepSeekSecurity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/a76vh6m6g8ehgkwa/CSChat_5_-_EP_5_-_01_28_25_-_DeepSeek_China_s_AI_Ambitions_FINAL_v2_-_MP3afuv4.mp3" length="18330144" type="audio/mpeg"/>
        <itunes:summary><![CDATA[DeepSeek or DeepRisk?
A new AI powerhouse is making waves—DeepSeek has skyrocketed in popularity, rivaling top AI models at a fraction of the cost.
But with data stored in China and unknown security safeguards, is your organization at risk? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the cybersecurity implications of AI tools like DeepSeek. You'll learn about:
▪ DeepSeek's unique IP exposure risks and cybersecurity challenges.▪ The growing threat of "Shadow AI" in your organization and supply chain.▪ How to update your policies, vet vendors, and protect sensitive data in an era of rapidly evolving AI risks.
Join Sherri and Matt as they provide an in-depth look at DeepSeek's cybersecurity risks and explain why your organization must communicate clear acceptable use policies with employees and partners.
Don’t forget to follow us for weekly Cyberside Chats security updates!
🔗 Here’s the LMG Security AI Readiness Checklist we reference in the video:https://www.LMGsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates
#DeepSeek #cybersecurity #cyberaware #cybersecurityawareness #ciso #cybersecure #aithreats #ai #DeepSeekSecurity]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>835</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/y8raby8iapike6j3/CSChat_5_-_EP_5_-_01_28_25_-_DeepSeek_China_s_AI_Ambitions_FINAL_v2_SMALL_b1pwe-r36ekz-Optimized.vtt" type="text/vtt" />    </item>
    <item>
        <title>The Silk Road, a Pardon, and the Future of Cybercrime</title>
        <itunes:title>The Silk Road, a Pardon, and the Future of Cybercrime</itunes:title>
        <link>https://www.chatcyberside.com/e/ross-ulbrichts-pardon-a-turning-point-in-cybersecurity/</link>
                    <comments>https://www.chatcyberside.com/e/ross-ulbrichts-pardon-a-turning-point-in-cybersecurity/#comments</comments>        <pubDate>Tue, 28 Jan 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/105cbe86-5b9a-306e-9d17-e508eb3191ca</guid>
                                    <description><![CDATA[<p>In this episode of Cyberside Chats, we dive into the surprising pardon of Ross Ulbricht, creator of the infamous Silk Road dark web marketplace. What does this decision mean for the future of cybercrime enforcement and your organization’s security? We’ll explore the potential policy shift, how it could embolden criminals, and actionable steps you can take to stay ahead of evolving threats. Don't miss these critical insights! </p>
<p>Takeaways: </p>
<ul>
<li>Anticipate Increased Cybercrime Activity. The pardon of Ross Ulbricht could embolden cybercriminals. Proactively strengthen your organization’s defenses by updating incident response plans and running tabletop exercises to prepare for more brazen attacks. </li>
</ul>
<ul>
<li>Monitor Policy Changes Closely. Stay informed about shifts in U.S. government enforcement against cybercrime. If the crackdown slows, adapt your risk assessments and adjust your security posture to counter an evolving threat landscape. </li>
</ul>
<ul>
<li>Collaborate and Share Intelligence. Join industry groups and forums to exchange insights on how others are preparing for and responding to cyber threats in the wake of policy and enforcement changes.  </li>
</ul>
<ul>
<li>Reinforce Employee Training. With the possibility of emboldened cybercriminals, ensure staff are well-trained to recognize phishing and social engineering tactics, which are often the first step in an attack. </li>
</ul>
<ul>
<li>Enhance Threat Detection Capabilities. Invest in tools and services that monitor dark web activity and ransomware trends to stay ahead of potential threats, especially as new actors and groups emerge. </li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of <em>Cyberside Chats</em>, we dive into the surprising pardon of Ross Ulbricht, creator of the infamous Silk Road dark web marketplace. What does this decision mean for the future of cybercrime enforcement and your organization’s security? We’ll explore the potential policy shift, how it could embolden criminals, and actionable steps you can take to stay ahead of evolving threats. Don't miss these critical insights! </p>
<p>Takeaways: </p>
<ul>
<li>Anticipate Increased Cybercrime Activity. The pardon of Ross Ulbricht could embolden cybercriminals. Proactively strengthen your organization’s defenses by updating incident response plans and running tabletop exercises to prepare for more brazen attacks. </li>
</ul>
<ul>
<li>Monitor Policy Changes Closely. Stay informed about shifts in U.S. government enforcement against cybercrime. If the crackdown slows, adapt your risk assessments and adjust your security posture to counter an evolving threat landscape. </li>
</ul>
<ul>
<li>Collaborate and Share Intelligence. Join industry groups and forums to exchange insights on how others are preparing for and responding to cyber threats in the wake of policy and enforcement changes.  </li>
</ul>
<ul>
<li>Reinforce Employee Training. With the possibility of emboldened cybercriminals, ensure staff are well-trained to recognize phishing and social engineering tactics, which are often the first step in an attack. </li>
</ul>
<ul>
<li>Enhance Threat Detection Capabilities. Invest in tools and services that monitor dark web activity and ransomware trends to stay ahead of potential threats, especially as new actors and groups emerge. </li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tze3kkr8pptajind/CSChat_4_-_EP_4_-_01_23_25_-_The_Silk_Road_FINAL_v1_MP38gt24-6su3ak-Optimized.mp3" length="12752475" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyberside Chats, we dive into the surprising pardon of Ross Ulbricht, creator of the infamous Silk Road dark web marketplace. What does this decision mean for the future of cybercrime enforcement and your organization’s security? We’ll explore the potential policy shift, how it could embolden criminals, and actionable steps you can take to stay ahead of evolving threats. Don't miss these critical insights! 
Takeaways: 

Anticipate Increased Cybercrime Activity. The pardon of Ross Ulbricht could embolden cybercriminals. Proactively strengthen your organization’s defenses by updating incident response plans and running tabletop exercises to prepare for more brazen attacks. 


Monitor Policy Changes Closely. Stay informed about shifts in U.S. government enforcement against cybercrime. If the crackdown slows, adapt your risk assessments and adjust your security posture to counter an evolving threat landscape. 


Collaborate and Share Intelligence. Join industry groups and forums to exchange insights on how others are preparing for and responding to cyber threats in the wake of policy and enforcement changes.  


Reinforce Employee Training. With the possibility of emboldened cybercriminals, ensure staff are well-trained to recognize phishing and social engineering tactics, which are often the first step in an attack. 


Enhance Threat Detection Capabilities. Invest in tools and services that monitor dark web activity and ransomware trends to stay ahead of potential threats, especially as new actors and groups emerge. 
]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>759</itunes:duration>
                <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/x35f3jhmaec7qr8d/CSChat_4_-_EP_4_-_01_23_25_-_The_Silk_Road_FINAL_v1_MP38gt24-6su3ak-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/p9fnedidy6iatnaa/CSChat_4_-_EP_4_-_01_23_25_-_The_Silk_Road_FINAL_v1_MP38gt24-6su3ak-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>When the FBI Becomes Your IT Department</title>
        <itunes:title>When the FBI Becomes Your IT Department</itunes:title>
        <link>https://www.chatcyberside.com/e/inside-the-fbis-malware-takedown-what-you-need-to-know/</link>
                    <comments>https://www.chatcyberside.com/e/inside-the-fbis-malware-takedown-what-you-need-to-know/#comments</comments>        <pubDate>Tue, 21 Jan 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/cfaa4ec5-5db2-3d66-a1f4-4e04cd211740</guid>
                                    <description><![CDATA[<p>In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers.</p>
<p>We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events.</p>
<p>Key topics include:</p>
<ul>
<li>How the FBI executed the PlugX takedown and what it means for organizations.</li>
<li>The risks and benefits of law enforcement hacking into private systems to mitigate threats.</li>
<li>Preparing for potential third-party access to your network by “authorized” actors like law enforcement or tech vendors.</li>
</ul>
<p>Takeaways:</p>
<ul>
<li>Be aware that “authorized” third parties, such as law enforcement or Microsoft, may access your computers if they’re part of a botnet.</li>
<li>Monitor threat intelligence feeds so you’re informed when events like these occur.</li>
<li>Proactively communicate with your ISP about their processes for responding to law enforcement notifications.</li>
<li>Ensure your contact information is current with your ISP and DNS registrars to avoid communication gaps.</li>
<li>Review and update your incident response (IR) and forensics plans to account for potential third-party access.</li>
<li>Include scenarios involving third-party access in your tabletop exercises to improve preparedness.</li>
</ul>
<p>Resources:</p>
<p><a href='https://www.theverge.com/2025/1/14/24343495/fbi-computer-hack-uninstall-plugx-malware'>“FBI Hacked Thousands of Computers to Make Malware Uninstall Itself”</a></p>
<p><a href='https://www.csoonline.com/article/570653/the-microsoft-exchange-server-hack-a-timeline.html'>“The Microsoft Exchange Server Hack: A Timeline”</a></p>
<p><a href='https://www.youtube.com/watch?v=jdFD0a7-GsU'>“Taking Down the Waledac Botnet (The Story of Operation b49)”</a></p>
<p>Have thoughts or questions about this episode? <a href='https://www.lmgsecurity.com/contact-us/'>Contact us</a> to discuss this and more with other cybersecurity professionals.</p>
<p>#cybersecurity #PlugX #PlugXhack #hack #hacker</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of <em>Cyberside Chats</em>, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers.</p>
<p>We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events.</p>
<p>Key topics include:</p>
<ul>
<li>How the FBI executed the PlugX takedown and what it means for organizations.</li>
<li>The risks and benefits of law enforcement hacking into private systems to mitigate threats.</li>
<li>Preparing for potential third-party access to your network by “authorized” actors like law enforcement or tech vendors.</li>
</ul>
<p>Takeaways:</p>
<ul>
<li>Be aware that “authorized” third parties, such as law enforcement or Microsoft, may access your computers if they’re part of a botnet.</li>
<li>Monitor threat intelligence feeds so you’re informed when events like these occur.</li>
<li>Proactively communicate with your ISP about their processes for responding to law enforcement notifications.</li>
<li>Ensure your contact information is current with your ISP and DNS registrars to avoid communication gaps.</li>
<li>Review and update your incident response (IR) and forensics plans to account for potential third-party access.</li>
<li>Include scenarios involving third-party access in your tabletop exercises to improve preparedness.</li>
</ul>
<p>Resources:</p>
<p><a href='https://www.theverge.com/2025/1/14/24343495/fbi-computer-hack-uninstall-plugx-malware'>“FBI Hacked Thousands of Computers to Make Malware Uninstall Itself”</a></p>
<p><a href='https://www.csoonline.com/article/570653/the-microsoft-exchange-server-hack-a-timeline.html'>“The Microsoft Exchange Server Hack: A Timeline”</a></p>
<p><a href='https://www.youtube.com/watch?v=jdFD0a7-GsU'>“Taking Down the Waledac Botnet (The Story of Operation b49)”</a></p>
<p>Have thoughts or questions about this episode? <a href='https://www.lmgsecurity.com/contact-us/'>Contact us</a> to discuss this and more with other cybersecurity professionals.</p>
<p>#cybersecurity #PlugX #PlugXhack #hack #hacker</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6vt6ypybvjqgkfq5/CSChat_35_-_EP_3_-_05_15_25_-_When_the_FBI_Becomes_MP37qyy1-gd8x7m-Optimized.mp3" length="13094200" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers.
We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events.
Key topics include:

How the FBI executed the PlugX takedown and what it means for organizations.
The risks and benefits of law enforcement hacking into private systems to mitigate threats.
Preparing for potential third-party access to your network by “authorized” actors like law enforcement or tech vendors.

Takeaways:

Be aware that “authorized” third parties, such as law enforcement or Microsoft, may access your computers if they’re part of a botnet.
Monitor threat intelligence feeds so you’re informed when events like these occur.
Proactively communicate with your ISP about their processes for responding to law enforcement notifications.
Ensure your contact information is current with your ISP and DNS registrars to avoid communication gaps.
Review and update your incident response (IR) and forensics plans to account for potential third-party access.
Include scenarios involving third-party access in your tabletop exercises to improve preparedness.

Resources:
“FBI Hacked Thousands of Computers to Make Malware Uninstall Itself”
“The Microsoft Exchange Server Hack: A Timeline”
“Taking Down the Waledac Botnet (The Story of Operation b49)”
Have thoughts or questions about this episode? Contact us to discuss this and more with other cybersecurity professionals.
#cybersecurity #PlugX #PlugXhack #hack #hacker]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>780</itunes:duration>
                <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/pcpiw9zvfjr8pbgh/CSChat_35_-_EP_3_-_05_15_25_-_When_the_FBI_Becomes_MP37qyy1-gd8x7m-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/98jnmn7hb8kgys3k/CSChat_35_-_EP_3_-_05_15_25_-_When_the_FBI_Becomes_MP37qyy1-gd8x7m-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>Cyber Trust or Bust? The New FTC Cyber Trust Mark</title>
        <itunes:title>Cyber Trust or Bust? The New FTC Cyber Trust Mark</itunes:title>
        <link>https://www.chatcyberside.com/e/decoding-the-us-cybertrust-mark-what-you-need-to-know/</link>
                    <comments>https://www.chatcyberside.com/e/decoding-the-us-cybertrust-mark-what-you-need-to-know/#comments</comments>        <pubDate>Tue, 14 Jan 2025 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/969e9799-3b72-3523-9544-c3a13d16b3ee</guid>
                                    <description><![CDATA[<p>In Episode 2 of CyberSide Chats, Sherri Davidoff and Matt Durrin dive into the launch of the U.S. Cyber Trust Mark, a new security initiative aimed at making Internet of Things (IoT) devices more secure for consumers. As the number of connected devices continues to rise, the U.S. Cyber Trust Mark promises to help users make informed decisions about the security of products like cameras, smart locks, and voice assistants.</p>
<p>Sherri and Matt will discuss the potential impacts of the Cyber Trust Mark and discuss the ongoing challenges of securing IoT devices. They also tackle the rising threat of QR code phishing, as more devices will carry QR codes for secure setup—raising new concerns for consumers.</p>
<p>Tune in to learn how this new mark can help protect your privacy and security in an increasingly connected world!</p>
<p>Don’t forget to like, subscribe, and share this episode to stay informed on the latest cybersecurity trends!</p>
<p>#USCyberTrustMark #cybersecurity #cyberaware</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In Episode 2 of <em>CyberSide Chats</em>, Sherri Davidoff and Matt Durrin dive into the launch of the U.S. Cyber Trust Mark, a new security initiative aimed at making Internet of Things (IoT) devices more secure for consumers. As the number of connected devices continues to rise, the U.S. Cyber Trust Mark promises to help users make informed decisions about the security of products like cameras, smart locks, and voice assistants.</p>
<p>Sherri and Matt will discuss the potential impacts of the Cyber Trust Mark and discuss the ongoing challenges of securing IoT devices. They also tackle the rising threat of QR code phishing, as more devices will carry QR codes for secure setup—raising new concerns for consumers.</p>
<p>Tune in to learn how this new mark can help protect your privacy and security in an increasingly connected world!</p>
<p>Don’t forget to like, subscribe, and share this episode to stay informed on the latest cybersecurity trends!</p>
<p>#USCyberTrustMark #cybersecurity #cyberaware</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/s66s7ivyrku9qqgm/CSChat_3_-_CYBER_TRUST_MARK_FINAL_MP39fji4-3jcad9-Optimized.mp3" length="15157120" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In Episode 2 of CyberSide Chats, Sherri Davidoff and Matt Durrin dive into the launch of the U.S. Cyber Trust Mark, a new security initiative aimed at making Internet of Things (IoT) devices more secure for consumers. As the number of connected devices continues to rise, the U.S. Cyber Trust Mark promises to help users make informed decisions about the security of products like cameras, smart locks, and voice assistants.
Sherri and Matt will discuss the potential impacts of the Cyber Trust Mark and discuss the ongoing challenges of securing IoT devices. They also tackle the rising threat of QR code phishing, as more devices will carry QR codes for secure setup—raising new concerns for consumers.
Tune in to learn how this new mark can help protect your privacy and security in an increasingly connected world!
Don’t forget to like, subscribe, and share this episode to stay informed on the latest cybersecurity trends!
#USCyberTrustMark #cybersecurity #cyberaware]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>740</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/y8iisg99nq27mhmw/CSChat_3_-_CYBER_TRUST_MARK_FINAL_MP39fji4-3jcad9-Optimized.vtt" type="text/vtt" /><podcast:chapters url="https://mcdn.podbean.com/mf/web/h5q7sbd4ia6eys2n/CSChat_3_-_CYBER_TRUST_MARK_FINAL_MP39fji4-3jcad9-Optimized_chapters.json" type="application/json" />    </item>
    <item>
        <title>2025 Cybersecurity Priorities: The Top 3 Moves to Make</title>
        <itunes:title>2025 Cybersecurity Priorities: The Top 3 Moves to Make</itunes:title>
        <link>https://www.chatcyberside.com/e/unmasking-the-future-top-cybersecurity-priorities-for-2025/</link>
                    <comments>https://www.chatcyberside.com/e/unmasking-the-future-top-cybersecurity-priorities-for-2025/#comments</comments>        <pubDate>Tue, 17 Dec 2024 08:30:00 -0500</pubDate>
        <guid isPermaLink="false">Chatcyberside.podbean.com/f4256ed3-9617-3868-ac43-ff1082e3cdfb</guid>
                                    <description><![CDATA[<p>Join hosts Sherri Davidoff and Matt Durrin in this first engaging episode of CyberSide Chats, as they dive into the top cybersecurity priorities for 2025. This insightful discussion was recorded with a live Q &amp; A, and it covers the pervasive influence of AI, the emerging threats of deepfakes, and the complexities of managing third-party risks in an increasingly digital world.</p>
<p>This episode not only prepares listeners for the potential challenges of 2025 but also equips them with the knowledge to enhance their cybersecurity measures effectively. Tune in to stay informed and ready for the future!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Join hosts Sherri Davidoff and Matt Durrin in this first engaging episode of CyberSide Chats, as they dive into the top cybersecurity priorities for 2025. This insightful discussion was recorded with a live Q &amp; A, and it covers the pervasive influence of AI, the emerging threats of deepfakes, and the complexities of managing third-party risks in an increasingly digital world.</p>
<p>This episode not only prepares listeners for the potential challenges of 2025 but also equips them with the knowledge to enhance their cybersecurity measures effectively. Tune in to stay informed and ready for the future!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/79jgcpn84e2tcasz/CSChat_2_-_EP_1_-_2025_CYBERSECURITY_Priorities_MP3_-_FINAL_v18ms2v.mp3" length="29444280" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Join hosts Sherri Davidoff and Matt Durrin in this first engaging episode of CyberSide Chats, as they dive into the top cybersecurity priorities for 2025. This insightful discussion was recorded with a live Q &amp; A, and it covers the pervasive influence of AI, the emerging threats of deepfakes, and the complexities of managing third-party risks in an increasingly digital world.
This episode not only prepares listeners for the potential challenges of 2025 but also equips them with the knowledge to enhance their cybersecurity measures effectively. Tune in to stay informed and ready for the future!]]></itunes:summary>
        <itunes:author>Chatcyberside</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1407</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:transcript url="https://mcdn.podbean.com/mf/web/htmhza7yk3hsdge8/CSChat_2_-_EP_1_-_2025_CYBERSECURITY_Priorities_SMALL_-_FINAL_v16ukgz-9zzefa-Optimized.vtt" type="text/vtt" />    </item>
</channel>
</rss>
