Episoder

  • In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly impacted. Additionally, Blue Shield of California experienced a data breach affecting 4.7 million members due to a Google Analytics misconfiguration. The episode also covers global ransomware trends, revealing that 86% of affected firms paid ransoms, and the Verizon Data Breach Investigation Report's findings that ransomware is a factor in nearly half of all cyber incidents. David also previews upcoming cybersecurity events and hints at further discussions on phishing training and data security.

    00:00 Record Cybercrime Losses in 2024
    04:07 Blue Shield of California Data Breach
    07:03 Ransomware Crisis and Global Impact
    08:23 Verizon Data Breach Report Insights
    09:20 Upcoming Events and Closing Remarks

  • In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruling allowing a data privacy class action against Shopify to proceed in California. Additionally, the show covers the last-minute extension of funding for the Common Vulnerabilities and Exposures (CVE) program by the US Cybersecurity and Infrastructure Security Agency, averting a potential crisis in cybersecurity coordination. These discussions underscore the evolving challenges and solutions within the cybersecurity landscape.

    00:00 Introduction and Overview
    00:26 AI Employees: Opportunities and Risks
    01:48 Microsoft's AI Security Agents
    03:58 Shopify's Legal Battle Over Data Privacy
    05:12 CVE Program's Funding Crisis Averted
    07:24 Conclusion and Contact Information

  • Manglende episoder?

    Klik her for at forny feed.

  • Cybersecurity Today: Allegations Against Elon Musk, Microsoft Lockout Issues, Cozy Bear's New Malware, and Canada's Anti-Fraud Proposals In this episode of Cybersecurity Today, hosted by David Shipley, we examine several major cybersecurity stories. A whistleblower accuses Elon Musk's team's involvement in a significant cyber breach at the National Labor Relations Board. Administrators face challenges with Microsoft's Mace feature, causing widespread account lockouts over the Easter weekend. The Russian hacking group Cozy Bear targets European diplomats using wine-themed phishing tactics. Canadian Conservative leader Pierre Poilievre proposes stringent measures against online fraud, including hefty fines and criminal charges for companies failing to act against digital scammers. 00:00 Breaking News: Doge and the US Labor Watchdog Cyber Breach 03:30 Microsoft Security Feature Causes Weekend Chaos 06:08 Russian Hackers Target European Diplomats with Wine-Themed Phishing 07:30 Canadian Conservative Leader Proposes Anti-Fraud Measures 09:25 Conclusion and Contact Information

  • In this episode of Cybersecurity Today titled 'The Secret CISO,' host Jim Love, along with guests Octavia Howell, Daniel Pinsky, and John Pinard, delves into the personal and professional experiences of Chief Information Security Officers (CISOs). They share their journeys into cybersecurity, discuss the challenges and pressures of their roles, and offer insights into effective leadership and talent development. The discussion also covers the evolving nature of security threats, resource constraints, and the importance of continuous learning and strategic alignment in cybersecurity. This candid conversation aims to provide valuable perspectives for both aspiring and seasoned security professionals.

    00:00 Introduction to The Secret CISO
    01:11 Meet the CISOs
    03:08 Career Journeys and Reflections
    08:45 Challenges and Pressures of the Job
    23:21 Learning and Staying Ahead
    28:15 Leadership and Team Development
    40:34 Advice for Aspiring CISOs
    43:14 Conclusion and Audience Engagement

  • In this episode of Cybersecurity Today, hosted by Jim Love, the show salutes Katie Moussouris of Luta Security for her courage in speaking truth to power. The episode covers various significant news in the cybersecurity world: the explosion of identity theft in Canada’s tax system, Prodaft’s strategic purchase of hacker forum accounts for intelligence, Google’s new security feature for Android devices, Hertz's data breach due to a vendor hack, and a US attorney's allegations against a UK intelligence firm for orchestrating a hack-for-hire scheme. Additionally, the episode discusses the troubling political ramifications following President Trump’s revocation of security clearance from Chris Krebs, former CISA director, and the subsequent investigation, highlighting the importance of protecting free speech and integrity within the cybersecurity profession.

    00:00 Introduction and Salute to Katie Moussoursis
    00:44 Identity Theft Nightmare in Canada
    03:20 Prodaft's Innovative Cybercrime Monitoring
    05:22 Google's New Android Security Feature
    07:08 Hertz Data Breach and Legal Implications
    09:22 Controversial Hack-for-Hire Allegations
    11:26 Conclusion and Final Thoughts
    11:36 Speaking Truth to Power: The Case of Chris Krebs

  • In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through its latest Windows update, advising users not to delete it due to a linked security flaw. Lastly, AI-generated code dependencies are becoming a serious supply chain risk, with attackers creating malicious packages based on AI hallucinations. Users are advised to thoroughly review AI-generated code to avoid 'slop squatting'.

    00:00 Introduction and Fortinet VPN Exploits
    02:46 Microsoft's INET Pub Folder Issue
    04:57 AI Hallucinations and Code Dependencies
    06:22 Conclusion and Contact Information

  • In this captivating interview, host Jim Love sits down with Licenia Rojas, Senior Vice President and Chief Architect at TD Bank. They discuss Licenia's journey in the technology sector, the importance of mentorship, and the role of continuous learning in career development. The conversation also delves into evolving topics such as cybersecurity, AI innovation, and the increasingly pivotal role of architecture in modernizing financial institutions. Whether you're early in your career or a seasoned professional, this episode offers authentic and practical advice on navigating the tech industry.

    00:00 Introduction to the Interview Series
    01:25 Meet Licenia Rojas: Career Journey and Early Influences
    02:35 Discovering a Passion for Technology
    04:43 The Importance of Continuous Learning and Mentorship
    05:44 Navigating Career Transitions and Embracing New Roles
    08:06 The Role of Curiosity and Asking Questions
    13:24 The Value of Company Culture
    15:09 Current Role and Responsibilities at TD Bank
    17:08 The Evolution and Importance of Architecture in Technology
    21:23 Understanding the Technology Life Cycle
    22:48 Defining and Achieving Good Outcomes
    24:34 Customer-Centric Innovation
    26:40 Encouraging Employee Ideas and Feedback
    28:34 Overcoming Cynicism in Tech Teams
    31:35 Exciting Emerging Technologies
    35:57 The Role of AI in Enhancing Productivity
    38:50 Advice for Aspiring Technologists
    41:59 Conclusion and Final Thoughts

  • In this episode of Cybersecurity Today, host Jim Love covers the shutdown of a spammer exploiting OpenAI's GPT model, a cybersecurity breach at the US Office of the Comptroller of the Currency, and a new malware operation called 'Operation End Game' targeting major cybercrime networks. He also discusses the emergence of a destructive RAT on GitHub that poses a significant risk to Windows systems, and a critical vulnerability in the WordPress plugin AutoKit that was exploited mere hours after its disclosure. Ensure you stay updated on these evolving threats and the necessary precautions to safeguard your systems.

    00:00 Introduction and Headlines
    00:25 Spammers Exploit OpenAI's GPT Model
    02:14 US Bank Regulator Hacked
    04:25 Operation End Game: Tackling Cybercrime
    07:06 Neptune RAT: A New Threat to Windows
    09:12 WordPress Plugin Vulnerability Exploited
    11:25 Conclusion and Contact Information

  • In this episode of Cybersecurity Today, host Jim Love covers important security updates and warnings including critical flaws in WinRAR, a patch for a high severity zero-day vulnerability in Windows CLFS, and a security vulnerability in WhatsApp's Windows desktop application. He urges users to update their software to protect against exploits. Additionally, Jim discusses Identity Management Day and the concerning findings from an OKTA survey revealing Canadians' growing worries about identity theft. He announces his plan to create a special segment on new identity solutions to address these concerns. The episode also includes a shout-out to the BSides Calgary event for information security professionals.

    00:00 Introduction and Event Announcement
    00:51 Critical Flaws in Compression Utility
    03:33 Microsoft Patches Zero-Day Exploits
    05:01 WhatsApp Security Vulnerability
    06:46 Identity Management Day Insights
    10:13 Conclusion and Contact Information

  • In this episode of Cybersecurity Today, host David Shipley covers a range of crucial issues. With tax day approaching, Microsoft reports a rise in sophisticated tax-themed phishing campaigns. The IRS has issued a warning against using its name in phishing simulations to avoid legal repercussions. Furthermore, cybersecurity journalist Brian Krebs reveals that Minnesota cybersecurity expert Mark Lanterman is under FBI investigation for potentially falsifying his credentials, impacting thousands of court cases. Lastly, several Australian superannuation funds have been targeted in a cyber scam, raising questions about the necessity of multifactor authentication for financial services. The episode emphasizes the need for stringent standards in cybersecurity expertise and shared responsibility in financial security.

    00:00 Introduction and Headlines
    00:24 Tax-Themed Phishing Scams on the Rise
    00:36 Microsoft's Findings and IRS Warnings
    01:32 Phishing Simulations and Legal Risks
    02:53 Educating Employees on Phishing
    03:15 Minnesota Cybersecurity Expert Under Scrutiny
    04:25 Allegations and Legal Implications
    05:52 Australian Retirement Funds Cyber Scam
    06:16 Impact and Response to the Breach
    07:07 The Need for Stronger Security Measures
    08:26 Conclusion and Contact Information

  • In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton.

    The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud breach and its communication failures, the misuse of Signal by U.S. government officials, and global cybersecurity regulation efforts such as the UK's new critical infrastructure laws. They also cover notable incidents like the Kuala Lumpur International Airport ransomware attack and the NHS Scotland cyberattack, the continuous challenges of EDR bypasses, and the importance of fusing anti-fraud and cybersecurity efforts. The discussion emphasizes the need for effective communication and stringent security protocols amidst increasing cyber threats.

    00:00 Introduction and Panelist Introductions
    01:25 Oracle Cloud Breach: A Case Study in Incident Communication
    10:13 Signal Group Chat Controversy
    20:16 Leadership and Cybersecurity Legislation
    23:30 Cybersecurity Certification Program Overview
    24:27 Challenges in Cybersecurity Leadership
    24:59 Importance of Data Centers and MSPs
    26:53 UK Cybersecurity Bill and MSP Standards
    28:09 Cyber Essentials and CMMC Standards
    32:47 EDR Bypasses and Small Business Security
    39:32 Ransomware Attacks on Critical Infrastructure
    43:34 Law Enforcement and Cybercrime
    47:24 Conclusion and Final Thoughts

  • In this episode, host Jim Love discusses a rise in unauthorized network scans targeting Juniper and Palo Alto devices, raising concerns about espionage and botnet activities. The podcast also delves into the controversial use of the Signal app by National Security Advisor Mike Waltz's team for sensitive communications, sparking debates on security and legality. Additionally, the episode highlights the potential misuse of OpenAI’s advanced image generation tool for creating fraudulent documents. Finally, it covers the mysterious disappearance of cybersecurity professor JF Wang and his wife, following an FBI and Homeland Security investigation.

    00:00 Introduction and Overview
    00:23 Unauthorized Scans on Network Devices
    02:01 National Security Concerns with Signal App
    05:21 Risks of AI-Generated Images
    07:44 The Disappearance of a Cybersecurity Professor
    09:57 Conclusion and Upcoming Events

  • In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several UK-based dating apps that led to the exposure of approximately 1.5 million private images. The discussion highlights how attackers are increasingly using legitimate software tools to bypass security measures, the implications of these breaches for users, and offers practical tips for maintaining robust cybersecurity.

    00:00 Introduction to Today's Cyber Security News
    00:29 Compromised Endpoint Detection and Response Systems
    01:06 Bypassing Windows Defender: Methods and Implications
    02:52 Ransomware Tactics and Legitimate Tool Exploits
    04:20 Time Traveling Attacks and EDR Limitations
    06:33 Massive Data Breach on X (Twitter)
    08:30 UK Dating Apps Expose Private Images
    10:47 Fraud Alerts and Scams
    13:25 Conclusion and Final Thoughts

  • Cybersecurity Today: Hacktivism, Solar Power Vulnerabilities, and Global Phishing Challenges

    In this episode of Cybersecurity Today, host David Shipley covers multiple cybersecurity stories including: a Canadian hacker charged for the 2021 Texas GOP hack, vulnerabilities in solar power gear, France's national phishing test for students, and the tragic impact of online fraud in India. Shipley delves into the implications for cybersecurity professionals and emphasizes the need to destigmatize fraud and support victims.

    00:00 Introduction and Headlines
    00:25 Canadian Hacker Charged for Texas GOP Hack
    02:12 Vulnerabilities in Solar Power Gear
    02:56 France's National Phishing Simulation for Students
    04:19 Tragic Consequences of Online Fraud in India
    05:16 Rising Online Fraud and Its Impact in Canada
    06:15 Conclusion and Call to Action

  • In this episode, host Jim Love kicks off his new profile series with a deep dive into the compelling career of Dr. Priscilla Johnson, an environmental advocate at the crossroads of technology and sustainability. Dr. Johnson discusses her work in building a data center in South Africa amidst a severe drought, her tenure as Director of Water Strategy at Microsoft, and her transition into cyber intelligence. She explains how her unique background and empathetic approach have informed her career decisions and advocacy for responsible resource management. The conversation also touches on the importance of situational awareness in cybersecurity, making this episode a must-listen for anyone interested in the intersections of environmental engineering, infrastructure, and cybersecurity.

    00:00 Introduction to the Series
    00:29 Meet Dr. Priscilla Johnson
    00:54 Challenges of Building a Data Center in Africa
    01:16 Dr. Johnson's Background and Role at Microsoft
    02:38 Addressing the Water Crisis in South Africa
    06:34 Innovative Solutions and Collaborations
    19:12 Dr. Johnson's Journey into Environmental Engineering
    24:47 Discovering Texas and Dow Chemical
    25:15 Environmental Impact and Agent Orange
    27:00 Challenges in Environmental Management
    29:00 Maternity Leave and Data Issues
    34:46 Transition to Cybersecurity
    37:19 Cybersecurity Threats and Preparedness
    48:26 Mentorship and Career Advice
    53:20 Conclusion and Final Thoughts

  • Exposing Security Flaws: Government Officials' Data Leaks, Defense Contractor Fines, and Cyber Crime Involvement

    In this episode of Cybersecurity Today, host Jim Love highlights significant cybersecurity breaches affecting US security officials, a government defense contractor, and a Department of Government Efficiency staffer. Personal information of senior US security officials was found accessible online, raising concerns about national security. Morse Corp, a defense contractor, was fined $4.6 million for failing to meet cybersecurity requirements. Additionally, a 19-year-old tech aide from the Department of Government Efficiency was found linked to a cyber crime group, causing alarm due to his recent advisory roles with significant government agencies. The episode underscores the need for stringent cybersecurity practices and accurate compliance within government and defense circles.

    00:00 Introduction and Headlines
    00:24 Exposure of US Security Officials' Personal Information
    02:22 US Defense Contractor's Cybersecurity Failures
    04:40 19-Year-Old Linked to Cyber Crime Ring
    07:05 Conclusion and Final Thoughts

  • Oracle Denies Cloud Hack & Top Secret Military Leaks: Cybersecurity Today

    In today's episode of 'Cybersecurity Today,' host Jim Love delves into Oracle's denial of a claimed breach of its cloud systems, detailing the hacker's allegations and Oracle's firm response. Additionally, the episode explores an accidental leak of top-secret US military information to an editor at the Atlantic, revealing the astonishing lapses in secure communication. The show also covers renowned security expert Troy Hunt's phishing attack incident on his MailChimp account, highlighting vulnerabilities and lessons learned in cybersecurity. Stay tuned for comprehensive insights and expert analysis on these significant security events.

    00:00 Introduction and Oracle Cloud Breach Allegations
    00:52 Oracle's Response and Hacker Demands
    02:07 Classified Military Details Leaked to Journalist
    04:34 Troy Hunt's MailChimp Phishing Attack
    06:17 Lessons Learned and Final Thoughts
    07:38 Conclusion

  • In this episode of 'Cybersecurity Today,' host Jim Love covers several major cybersecurity events. A devastating breach at Oracle Cloud Infrastructure has exposed 6 million records affecting 140,000 businesses, linked to a threat actor known as Rose87168. The attack exploited vulnerabilities in Oracle Fusion Middleware 11G. New browser-in-the-middle attack techniques are discussed, which can steal data by bypassing multi-factor authentication. The episode also highlights a severe vulnerability in Synology's DiskStation Manager software that could allow remote attackers to take full control of affected systems. Lastly, significant budget cuts in the Cybersecurity and Infrastructure Security Agency’s (CISA) Red Team might weaken US government cyber defenses. Critical insights and mitigation strategies for these emerging threats are provided.

    00:00 Massive Oracle Supply Chain Attack
    03:08 Browser in the Middle Attack Explained
    06:03 Synology's Major Security Flaw
    08:08 US Government Red Team Disruptions
    10:31 Conclusion and Final Thoughts

  • The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions

    In this episode of 'Cybersecurity Today,' host Jim Love discusses the rising trends and severe impacts of cyber attacks on K-12 schools with Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security (CIS). They scrutinize recent studies showing a surge in cyber threats targeting educational institutions, emphasizing the vulnerability of schools and the motives behind these attacks. The discussion covers how cyber criminals exploit budgetary information and schedules to maximize impact, the profound repercussions of ransomware attacks on school communities, and the critical need for better cybersecurity practices and support. Randy Rose shares insights from the 2025 CIS MS-ISAC K-12 Cyber​security Report and offers practical advice on elevating security standards and fostering community resilience to protect sensitive school data from cyber threats.

    00:00 Introduction to Cybersecurity in Schools
    00:02 Iconic Hacking Movies and Real-Life Cyber Threats
    00:41 The Seriousness of School Cybersecurity
    01:10 Interview with Randy Rose: Introduction and CIS Overview
    01:40 CIS's Role and Randy's Journey
    03:27 Supporting Various Organizations
    04:26 Challenges Faced by Schools and Local Governments
    06:21 Cybersecurity Threats and Attack Patterns
    09:11 Impact of Cyber Attacks on Schools
    13:22 Detailed Findings from the CIS Report
    19:16 Human Factor in Cybersecurity
    19:29 Supply Chain and Data Security
    27:13 The Role of AI in Cybersecurity
    30:49 Ransomware and Its Devastating Effects
    32:27 Recommendations for Improving School Cybersecurity
    34:01 Conclusion and Final Thoughts

  • Cybersecurity Today: Critical IBM AIX Vulnerability and Major Browser Exploits Revealed

    In this episode, host Jim Love discusses pressing cybersecurity issues, including IBM's AIX operating system scoring a perfect 10 in security vulnerability, leaving critical sectors exposed to remote attacks. The episode also covers the mishandling of sensitive data by U.S. government agencies amid rapid layoffs, the viral exposure of dangerous browser exploits by YouTuber Matt Johansson, and the removal of over 300 malicious Android apps from the Google Play Store. Key recommendations for protecting against these threats are provided.

    00:00 Introduction to Cybersecurity News
    00:26 IBM AIX Vulnerabilities Exposed
    02:12 Government Layoffs and Security Risks
    04:02 Browser Exploits and Malicious Extensions
    06:39 Malicious Android Apps on Google Play
    08:45 Conclusion and Upcoming Topics