PodcastsNegóciosCybersecurity Today

Cybersecurity Today

Jim Love
Cybersecurity Today
Último episódio

426 episódios

  • Cybersecurity Today

    Exchange Zero-Day Under Attack, Ransomware Gets Smarter, Fortinet Critical Flaws

    19/05/2026 | 12min
    A dangerous new Microsoft Exchange zero-day is being actively exploited, ransomware gangs are adopting nation-state-style tactics, two fired contractors were caught deleting U.S. government databases after accidentally recording themselves on Microsoft Teams, and Fortinet has patched critical remote code execution flaws.
    In this episode of Cybersecurity Today, David Shipley breaks down four major cybersecurity stories that security teams need to know.
    Cybersecurity Today would like to thank Material Security for supporting this podcast.  Material security provides. faster, more complete detection and response for email, identity, and data threats inside Google Workspace and Microsoft 365.  Contact them at  material[dot]security 

    Microsoft has confirmed active exploitation of a new Exchange Server zero-day, CVE-2026-42897, affecting Exchange Server 2016, Exchange Server 2019, and Exchange Subscription Edition. There is currently no patch, only mitigations through the Exchange Emergency Mitigation Service, with some trade-offs for Outlook Web App users.
    Security researcher Marcus Hutchins highlights an unusually disciplined ransomware affiliate operation using tradecraft more commonly associated with nation-state attackers, including a custom SentinelOne endpoint detection and response (EDR) killer and a stripped-down toolset designed to leave fewer forensic traces.
    In one of the more astonishing insider threat stories of the week, former OPEX Corporation contractors Muneeb and Sohaib Akhtar were allegedly caught deleting 96 U.S. government databases after leaving a Microsoft Teams recording running.
    Also in this episode: Fortinet has released urgent patches for critical unauthenticated remote code execution vulnerabilities in FortiAuthenticator (CVE-2026-44277) and FortiSandbox (CVE-2026-26083).
    If you're responsible for enterprise security, patch management, incident response, or cyber risk, this is one you need to see.
    Chapters:
    00:00 Sponsor Message
    00:24 Headlines Intro
    00:49 Ransomware Nation-State Discipline
    04:18 Exchange Zero-Day Mitigation
    07:01 Fired Contractors Caught Recording
    09:21 Fortinet Critical Vulnerabilities
    11:07 Wrap Up and Sign Off
    11:38 Sponsor Deep Dive Ad
    #Cybersecurity #MicrosoftExchange #ZeroDay #Ransomware #Fortinet #CyberAttack #Infosec #DavidShipley #CybersecurityToday
  • Cybersecurity Today

    Inside CIRA: How Canada's .ca Registry Became a Global DNS & Cybersecurity Force

    16/05/2026 | 53min
    David Shipley interviews Jon Ferguson, VP at CIRA, about how the Canadian Internet Registration Authority evolved from early paper-based .ca registrations at UBC into a 142-person, member-based not-for-profit running .ca and authoritative Anycast DNS infrastructure now supporting 550+ TLDs globally. Ferguson explains how .ca's Canadian presence requirements help keep abuse rates low, and how CIRA reinvests surpluses into grants and cybersecurity tools, including Canadian Shield (DNS-based malware/phishing blocking and encrypted DNS with limited data retention) used by about 500,000 people and generating about 20 million blocks per month. They discuss CIRA's focus on municipalities, schools, hospitals, and universities, its move into endpoint security and a managed detection and response partner program with Calian, and concerns about AI-driven threats, online harm, and rebuilding trust and real-world connection.
    00:00 Weekend Show Kickoff
    01:30 Jon's Cyber Journey
    03:06 Inside CIRA DNS Role
    04:59 What Is CIRA
    07:23 Origin Story Of Dot Ca
    13:01 Anycast DNS Explained
    16:27 Canadian Shield DNS Firewall
    22:21 Serving Public Sector Needs
    26:18 Endpoint And MDR Expansion
    35:05 Mission Over Money
    40:39 What Keeps Him Up
    46:19 Hope And Balance Online
    50:55 Wrap Up And Thanks
  • Cybersecurity Today

    How a Google API Key Became an $8,000 AI Bill, Meta Scam Ads Lawsuit, and 73-Second Cyber Attacks

    15/05/2026 | 10min
    Google Cloud customers are reporting shocking surprise bills after compromised or misused API keys were allegedly used to access expensive Gemini AI services. In one case, Rod Dinan says his monthly Google Cloud costs jumped from under $50 to nearly $8,000. Sydney developer Isuru Fonseka says he was hit despite setting spending controls, raising broader questions about API key security, client-side exposure, billing alerts, and how quickly attackers can exploit AI infrastructure.
    Cybersecurity Today also covers prosecutors' allegations that two fired brothers sabotaged systems tied to government-related work after access wasn't revoked quickly enough, Santa Clara County's civil lawsuit accusing Meta of profiting from scam ads on Facebook and Instagram, and Horizon3.ai's warning that attackers can exploit newly exposed systems in as little as 73 seconds while many organisations still take 24 hours or longer to respond.
    If your organisation uses APIs, AI services, cloud billing controls, or internet-facing infrastructure, this episode matters.
    #Cybersecurity #GoogleCloud #GeminiAI #APIKeys #CloudSecurity #Meta #ScamAds #CyberAttack #CybersecurityToday #AIsecurity
    CHAPTERS
    00:00 Google Cloud API Key Bill Shock
    01:20 Real-World Victims: Surprise AI Charges
    02:24 Why Spending Caps Didn't Stop the Damage
    03:38 The Enterprise Cloud Security Risk
    04:19 Fired Employees and Alleged Insider Sabotage
    04:55 The Database Destruction Timeline
    06:34 What This Incident Teaches Security Teams
    07:10 Santa Clara County Sues Meta Over Scam Ads
    08:46 Attackers Can Strike in 73 Seconds
    10:14 Closing and Next Episode
  • Cybersecurity Today

    Canvas Breach 'Deal' With ShinyHunters, AI Zero-Day Warning, Checkmarx Hit Again

    13/05/2026 | 16min
    Cybersecurity Today examines a troubling set of new security developments affecting schools, software supply chains, and account security.
    Instructure says it reached an "agreement" with the ShinyHunters threat group after the massive Canvas breach that may have affected up to 275 million users across 9,000 educational institutions. Reports indicate attackers exploited multiple cross-site scripting (XSS) vulnerabilities to hijack administrator sessions and post extortion demands.
    Checkmarx has been breached again. This time, attackers reportedly inserted a malicious Jenkins Application Security Testing (AST) plugin designed to steal credentials. The same threat actor, believed to be Team46/TeamTNT-linked infrastructure or Team PCP depending on reporting attribution, appears to have reused secrets allegedly stolen in the earlier Trivy supply-chain compromise.
    Microsoft and Google are warning organizations not to treat passkeys as a complete security solution. If weaker recovery methods or legacy credentials remain active, attackers can still bypass them.
    Google's Threat Intelligence Group also reports what it describes as the first observed evidence of hostile actors using AI to assist in zero-day vulnerability research and exploit development, signalling a new phase in attacker industrialization.
    Also in today's show: Santa Clara County sues Meta over alleged scam-ad profits.
    Chapters
    00:00 Headlines Overview
    00:28 Canvas Breach Deal Fallout
    01:59 How the XSS Attack Worked
    03:15 Checkmarx Supply Chain Attack
    05:01 Credential Rotation Lessons
    05:37 Why Passkeys Aren't Enough
    07:19 Layered Defence Takeaways
    08:35 AI-Assisted Zero-Day Development
    10:10 Industrialized AI Threats
    13:08 Meta Scam Ads Lawsuit
    15:19 Wrap Up
  • Cybersecurity Today

    Canvas Breach Exposes 275M Accounts | AI Targets Water Systems | GM OnStar Settlement

    11/05/2026 | 16min
    A massive cybersecurity week.
    On this episode of Cybersecurity Today, David Shipley breaks down the reported breach of Instructure's Canvas learning platform, where attacks linked to the ShinyHunters extortion group may have exposed data tied to up to 275 million user accounts across more than 9,000 educational institutions. The incident disrupted access, delayed exams, and forced Instructure to disable its "Free for Teacher" program after attackers allegedly used it to post extortion messages.
    Also in this episode: the Gentlemen ransomware group suffers a major internal leak, exposing affiliate chats, tooling, victim data, and operational details — a rare look inside a live ransomware operation.
    Then, General Motors agrees to a $12.75 million California settlement over allegations involving OnStar-linked driver data collection and sharing, raising fresh questions about privacy in connected vehicles.
    And finally: security researchers report what appears to be the first documented AI-assisted operational technology (OT) cyberattack attempt targeting a water utility in Monterrey, Mexico. The attempt failed to reach industrial control systems, but combined with confirmed attacks on water infrastructure in Poland, it signals a worrying shift in critical infrastructure threats.
    If you work in cybersecurity, IT, infrastructure, education, or privacy, this episode matters.
    Chapters
    00:00 Top Headlines Rundown
    00:41 Canvas Mega Breach
    02:44 ShinyHunters Background
    03:26 Ransom Pressure Fallout
    04:25 Gentlemen Ransomware Leak
    05:18 Inside the Data Dump
    06:18 GM OnStar Privacy Settlement
    08:17 What Drivers Should Know
    09:39 AI Meets OT Attacks
    11:52 Monterrey Water Near Miss
    13:29 Poland Water Systems Hit
    15:07 Defending Critical Infrastructure
    16:29 Wrap Up And Thanks
    #Cybersecurity #Canvas #ShinyHunters #Ransomware #OnStar #GeneralMotors #DataBreach #CriticalInfrastructure #WaterUtility #OperationalTechnology #ICS #CyberAttack #Privacy #DavidShipley #CybersecurityToday
Mais podcasts de Negócios
Sobre Cybersecurity Today
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Site de podcast

Ouça Cybersecurity Today, Jota Jota Podcast e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Cybersecurity Today: Podcast do grupo