DiscoverCybersecurity Today
Cybersecurity Today
Claim Ownership

Cybersecurity Today

Author: Jim Love

Subscribed: 2,215Played: 86,339
Share

Description

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
955 Episodes
Reverse
Welcome to a special weekend edition of Cyber Security Today! In this long weekend episode, we delve into the world of artificial intelligence (AI) and its impact on various sectors, particularly as organizations ramp up their plans for the upcoming year. Join our host Jim Love and a distinguished panel of experts: Evgeny Koloda, Marcel Gagne, John Pinard, and Nicole Bendrich, as they explore the current state of AI, its promises, practical implementations, and the cybersecurity challenges associated with it. Discover valuable takeaways on developing an effective AI strategy and understanding the multi-modal advancements poised to revolutionize industries. 00:00 Introduction to the Special Weekend Edition 00:45 Meet the Expert Panel 02:25 The Promise and Challenges of AI 03:31 The Evolution of AI in Various Industries 06:41 Generative AI and Its Impact 07:53 AI in Cybersecurity 19:00 Human vs. AI: Decision Making and Errors 23:50 The Future of AI and Human Interaction 33:04 Expanding Human Capabilities with AI 35:04 Choosing the Right AI Model 40:09 Navigating AI in Regulated Industries 46:23 The Rise of Deepfakes and Cybersecurity Concerns 59:35 Building an Effective AI Strategy 01:04:15 Conclusion and Final Thoughts Resources: - AI Enterprise level HIPAA complaint GPT platform https://www.aivia.ai/ - EMR with AI capabilities eCW (eClinicalWorks) https://www.eclinicalworks.com/ - Digital Video Twin platform - HeyGen https://www.heygen.com/ - Canadian Digital Twin creation platform - Synthesia https://www.synthesia.io/ - Voice Cloning platform - Eleven Labs https://elevenlabs.io/ - Automation with AI - https://www.make.com Open Router https://openrouter.ai Jan.ai https://jan.ai/
In this episode of Cybersecurity Today, host Jim Love dives into the alarming rise of deepfake scams, highlighting how threat actors are using AI-generated videos to lure victims into fraudulent schemes. A notable campaign involves deepfake videos of Elon Musk promoting 'Quantum AI.' Additionally, the episode covers a sophisticated cyber attack where fake Palo Alto's Global Protect VPN is used to deploy malware. Lastly, it discusses Russia's potential threats against undersea communication cables and GPS systems, emphasizing the growing vulnerabilities in global infrastructure. Stay informed and secure with this essential update. 00:00 Introduction and Headlines 00:23 Deepfake Scams: The New Frontier 01:26 Quantum AI Scam Breakdown 02:47 Fake Palo Alto VPN: A Sophisticated Cyber Attack 04:21 Russia's Threat to Global Communications 06:35 Conclusion and Upcoming Show
Critical Cyber Security Alerts: Major Vulnerabilities and Exploits Unveiled In today's episode of Cyber Security Today, host Jim Love discusses a series of alarming cyber security incidents. Topics include a sophisticated attack exploiting a zero-day vulnerability in a popular network management platform, critical patches from SonicWall and Google addressing severe vulnerabilities, and an update on the National Public Data hack revealing deeper security issues. Learn about the latest threats and essential security measures you need to take now. 00:00 Introduction and Headlines 00:22 Sophisticated Cyber Attack on ISPs 02:43 SonicWall Firewall Vulnerability 04:29 Google Chrome Zero-Day Exploit 06:23 National Public Data Breach Update 07:58 Conclusion and Additional Resources
Cybersecurity Failures: Lawsuits, Outages, and International Threats In this episode of Cybersecurity Today, host Jim Love covers a range of critical cybersecurity issues. The U.S. sues Georgia Tech for not meeting cybersecurity standards as a Pentagon contractor. A potential cyber attack disrupts operations at Seattle’s port and airport. Microsoft plans a security summit following a major global IT outage caused by CrowdStrike. The effectiveness of publicly naming and shaming countries sponsoring cyberattacks is questioned. Join us as we delve into these pressing topics and their implications for cybersecurity policy and infrastructure resilience. 00:00 Cybersecurity Headlines: U.S. Sues Georgia Tech and Seattle Port Outage 00:24 Seattle Port and SeaTac Airport Cyber Attack Details 01:56 U.S. Government Sues Georgia Tech Over Cybersecurity Failures 03:27 Microsoft Security Summit and CrowdStrike Outage 04:11 Debate Over Microsoft's Proposed Security Changes 05:13 Effectiveness of Naming and Shaming in Cybersecurity 06:41 Challenges in Combating State-Sponsored Cyber Attacks 07:05 Conclusion and Show Notes
Join host Jim Love in this weekend edition of Cyber Security Today, featuring a distinguished panel including Terry Cutler (Cyology Labs), David Shipley (Beauceron Security), and special guest Tara Gold (Cado Security). The episode delves into key cybersecurity topics including the value of IT certifications, the rising trend in ransomware payouts, and the novel attack vectors targeting macOS systems. The show also explores the impact of poisoned search terms and the rising threats to small and medium-sized businesses. Don't miss this engaging and insightful discussion on the latest cybersecurity trends and best practices. 00:00 Welcome to Cyber Security Today 00:05 Meet the Panel and Special Guest 02:31 Introduction to Key Stories 03:04 Debate on IT Certifications 12:07 Ransomware Trends and Insights 18:46 Search Terms as Attack Vectors 23:26 Mac OS Vulnerabilities and Malware 30:17 Conclusion and Farewell
In this episode, host Jim Love delves into significant cybersecurity news, including a rise in FakeBat malware infections from malvertising campaigns, car companies selling driver data to brokers without consent, and McAfee's new deepfake detection tool. Highlights include the sophisticated methods of the FakeBat campaign, privacy concerns from automakers' data practices, and McAfee's innovative on-device solution for detecting AI-generated content. 00:00 Introduction to Cybersecurity Today 00:24 Malvertising Campaigns and FakeBat Malware 02:21 Automakers Selling Driver Data 04:22 McAfee's Deepfake Detection Tool 06:14 Show Wrap-Up and Additional Insights
Ransomware Record Highs, North Korean Exploits, Toyota Data Breach, and Mac Security Flaws - Aug 21, 2024 In this episode of Cybersecurity Today, host Jim Love discusses the latest cybersecurity threats and incidents making headlines. Topics include record-high ransomware payments in 2024, a sophisticated malware exploit by North Korean hackers, a significant data breach at Toyota, and newly uncovered vulnerabilities in Microsoft's Office Suite for Mac users. Stay informed on these critical issues and more. 00:00 Record-Breaking Ransomware Payments in 2024 02:38 North Korea's Advanced Malware Exploits Windows Zero Day 04:53 Toyota's Massive Data Breach Exposed 06:37 Mac Users Beware: Vulnerabilities in Microsoft Office Suite 09:03 Show Wrap-Up and Listener Appreciation
Cybersecurity Today: OpenAI's Action Against Iranian Disinformation & Chrome's New Privacy Features In this episode of Cybersecurity Today, host Jim Love discusses OpenAI's recent identification and neutralization of chat GPT accounts linked to Iranian disinformation campaigns, Google's upcoming privacy enhancements in Chrome for Android, and the cybersecurity concerns raised by U.S. lawmakers over Chinese-made TP Link routers. The episode also highlights a new study revealing the cybersecurity risks posed by employees using work laptops for personal activities. Tune in to stay informed about the latest developments in cybersecurity. 00:00 Introduction and Headlines 00:22 OpenAI's Battle Against Iranian Disinformation 02:05 Google Chrome's New Privacy Features 03:29 Domain Hijacking Risks Highlighted 05:14 Concerns Over Chinese-Made Routers 07:25 Risks of Using Work Laptops for Personal Use 09:29 Conclusion
In this special edition of Cybersecurity Today, your deepfake host Jim Love dives into the world of cybersecurity with new guests Marcel Gagné, an open-source guru, and Andréanne Bergeron, the director of research at GoSecure. The panel, including regular David Shipley, discusses the increasing threat of deepfakes in corporate and political spheres, the resilience required to combat modern cyber threats, and the necessity of critical thinking and education to navigate the ever-evolving landscape. From CrowdStrike's humble admission of a major security lapse to the growing concerns around AI-driven attacks, this episode offers insights and practical advice for both IT professionals and the general public. Don't miss out on this engaging discussion on how to stay ahead of cybersecurity challenges! 00:00 Introduction to Cybersecurity Today 00:22 Meet the Panel: Experts in Cybersecurity 02:08 CrowdStrike's Humility at DEF CON 03:54 Elon Musk and Infrastructure Failures 12:05 The Debate on Digital Identification 21:02 Deep Fakes: The New Frontier 23:59 The Rise of Digital Avatars 24:28 Open Source and Security Concerns 24:55 Commercial Availability and Control Issues 26:08 Media and Public Perception 26:56 Deepfakes in Politics and Business 27:29 Ease of Creating Deepfakes 27:57 Real-Time Deepfake Threats 29:12 Organizational Resilience and Culture 29:59 Human Psychology and Cybercrime 33:19 The Future of AI and Human Intelligence 35:23 Critical Thinking and Education 37:19 Balancing Technology and Human Factors 39:33 Final Thoughts and Recommendations 50:14 Closing Remarks and Acknowledgements
Cybersecurity Insights: Paris Olympics and Deepfake Technologies In this episode, host Jim Love discusses proactive cybersecurity measures taken during the Paris 2024 Olympics to combat threats such as domain abuse, counterfeit shops, unauthorized live streaming, cryptocurrency scams, and betting fraud. He highlights a report from before AI on pre-Olympic threats and emphasizes the importance of relying on official sources. Additionally, Love covers advancements in deepfake technologies, including new offerings like Hey Gen, Elon Musk's GROK, and the open-source Deep Live Cam, which raise significant concerns about digital impersonation and fraud. Simple verification strategies, like safe words, are suggested as countermeasures as these technologies become more accessible. Tune in for a Week in Review panel on these topics. 00:00 Introduction and Overview 00:23 Cybersecurity Measures for the Paris Olympics 00:53 Key Findings from the Before AI Report 01:55 Proactive Measures and Advice for Viewers 02:48 Deep Fake Technology Demonstrations at DEF CON 03:54 Concerns Over Deep Live Cam and Digital Security 05:32 Ethical Implications and Future Considerations 05:40 Conclusion and Week in Review Preview
In this episode of Cybersecurity Today, host Jim Love delves into Elon Musk's claim that a DDoS attack delayed his live interview with Donald Trump, the revelation of a massive data breach compromising most U.S. social security numbers, and CrowdStrike's president accepting the 'Most Epic Fail' award at DEF CON. The episode covers the skepticism around Musk's DDoS claim, details on the National Public Data hack, and CrowdStrike's approach to owning up to its global IT outage. Tune in for the latest updates in cybersecurity! 00:00 Introduction and Headlines 00:21 Elon Musk's DDoS Claim and Technical Issues 02:06 Trump Campaign Hacked 03:00 National Public Data Breach 05:16 CrowdStrike's Epic Fail at DEF CON 06:34 Conclusion and Show Notes
Exposing Hidden Secrets: DEF CON Revelations, Ransomware Surge & GPS Spoofing Woes Join host Jim Love in this insightful episode of Cybersecurity Today. Discover the shocking revelation of over 15,000 hard-coded secrets uncovered at DEF CON by researcher Bill Dermacapi, and learn about a new ransomware attack targeting home users. We also delve into a startling rise in GPS spoofing attacks on commercial airlines that are causing chaos in-flight. Stay informed with our latest updates and expert advice to keep you and your data secure. 00:00 Introduction and Headlines 00:22 North Korean Hackers Arrested 01:12 DEFCON Security Conference Highlights 04:05 Magniber Ransomware Attacks 05:52 GPS Spoofing Threats to Airlines 07:15 Conclusion and Listener Feedback
Cybersecurity Insights: Malvertising, Phishing Trends, and North Korean Hackers In this weekend edition of 'Cybersecurity Today,' host Jim Love brings together experts Terry Cutler from Cyology Labs, David Shipley from Beauceron Security, and Greg Monson from Trustwave. The panel explores the latest trends in cybersecurity, including a deep dive into a report on 'Malvertising,' the use of social media advertising to distribute malware. They also discuss a significant rise in phishing attempts and the challenges of detecting them, revealing a worrying leakage rate of up to 50%. The panel delves into a fascinating and concerning trend: North Korean hackers being hired as remote workers to infiltrate companies. Finally, they analyze the recent Delta lawsuit against CrowdStrike and Microsoft's involvement in the case. Tune in for expert insights, practical advice, and the latest updates in the ever-evolving field of cybersecurity. 00:00 Introduction and Panelist Introductions 01:27 Malvertising: A New Cyber Threat 04:13 The Rise of Alternative Communication Channels 07:39 Corporate Dangers of Facebook Account Takeovers 12:04 North Korean Hackers in Remote Work 20:11 Navigating Reference Checks and Hiring Challenges 20:27 The Intricacies of the Prisoner Swap 21:49 CrowdStrike's Legal Battle with Delta 24:24 The IT Professional's Dilemma 30:25 Phishing Email Statistics and Security Measures 35:59 Concluding Thoughts and Future Topics
Massive Data Breach, Outlook's Phishing Risk, and Windows Downgrade Attack Vulnerabilities In this episode of Cybersecurity Today, host Jim Love delves into one of the largest data breaches in history involving 2.9 billion records leaked without user consent by National Public Data. He also covers the backlash against Microsoft Outlook's email interface, which has inadvertently facilitated phishing attacks, and discusses a Black Hat presentation revealing vulnerabilities that allow attackers to unpatch fully updated Windows systems. Join us for insights and the latest updates in the world of cybersecurity. 00:00 Introduction and Major Data Breach Overview 00:31 Details of the National Public Data Breach 01:07 Implications and Legal Actions 02:42 Microsoft Outlook Phishing Vulnerability 04:08 Windows Security Vulnerability Exposed at Black Hat 05:57 Conclusion and Upcoming Content
Cyber Security Pros: Awareness vs. Action & The CrowdStrike Controversy Explained Join host Jim Love in this episode of 'Cyber Security Today' as he delves into a recent survey revealing a disconnect between awareness and action among global security professionals regarding unauthorized software use. Learn about the risks of shadow IT and AI applications, and the startling admittance of security pros themselves using unapproved SaaS. Additionally, explore the two latest stories from the CrowdStrike disaster, including the fallout between CrowdStrike and Delta Airlines, and the surprising involvement of Microsoft. Finally, hear about the importance of having a solid resiliency and recovery plan amidst these challenges. Tune in for these insights and more. 00:00 Introduction and Survey Findings 00:45 Shadow IT Risks and AI Concerns 02:17 CrowdStrike Controversy: Delta Airlines Incident 04:36 Microsoft's Response to Delta's Criticism 05:43 Lessons for IT Leaders 06:23 Show Conclusion and Host Announcement
In this episode of 'Cybersecurity Today: The Week in Review,' host Jim Love discusses critical cybersecurity incidents with guests Terry Cutler, CEO of Cyology Labs, and David Shipley from Beauceron Security. The panel delves into the devastating effects of a ransomware attack on the blood donation nonprofit OneBlood, emphasizing the broader implications for healthcare and emergency services. They also address the Canadian investigation into Ticketmaster's security practices and Microsoft's recent global outage, highlighting the significant challenges and necessary responses in safeguarding IT infrastructure. The discussion underscores the urgency of improving cybersecurity measures, particularly in healthcare, and the complexities of implementing effective regulations. 00:00 Introduction and Panel Introduction 00:19 Ransomware Attack on OneBlood 01:46 Healthcare System Vulnerabilities 04:05 Challenges in Cybersecurity for Healthcare 13:03 Ticketmaster Investigation and Government Inaction 20:03 Delta Airlines Lawsuit and Insurance Implications 28:38 Microsoft Global Service Interruption 35:12 Conclusion and Final Thoughts
In this episode of Cybersecurity Today, host Jim Love explores the aftermath of Microsoft's 10-hour global outage due to a DDoS attack, the Canadian Privacy Commissioner's investigation into Ticketmaster, the severe impact of a ransomware attack on U.S. blood bank OneBlood, and the cascading legal ramifications CrowdStrike faces after a disastrous software update. The episode delves into the broader implications of these cyber incidents and stresses the urgent need for robust cybersecurity measures. 00:00 Introduction and Major Headlines 00:29 Microsoft's 10-Hour Outage: Causes and Consequences 02:39 Ticketmaster Under Investigation: Privacy Concerns 03:45 OneBlood Ransomware Attack: Impact on Blood Supply 05:13 CrowdStrike Legal Battles: Fallout from Software Update 07:21 Conclusion and Upcoming Shows
Microsoft Cloud Outage, WhatsApp Vulnerability, and AI-Powered Screen Reading In today's episode of Cyber Security Today, host Jim Love covers a significant global outage affecting Microsoft's cloud services, a vulnerability in WhatsApp that allows malicious scripts to run without warning, and a new AI-powered method that can read your screen by intercepting HDMI signals. Stay informed about these pressing cybersecurity issues and learn how to protect yourself. 00:00 Microsoft Service Takes a Nosedive 00:16 Global Impact and Response 02:12 WhatsApp Vulnerability Warning 04:02 AI Decoding Screens from Afar 05:12 Show Wrap-Up and Future Episodes
Google's Password Bug Hits Millions & French Police Battle Malware - Cybersecurity Today In this episode of Cybersecurity Today, Jim Love covers Google's recent apology after a bug caused the passwords of 15 million Chrome users to vanish. The episode also dives into the French authorities' unique approach to combating the PlugX malware by deploying a disinfection solution. Lastly, it sheds light on the ongoing struggles with patch management in many organizations, particularly following the CrowdStrike disruption. Tune in for these stories and more, along with the challenges and solutions in today's cybersecurity landscape. 00:00 Google Apologizes for Password Vanishing Bug 01:55 French Authorities Combat PlugX Malware 03:44 The Unsexy Challenge of Patch Management 05:41 Conclusion and Show Notes
Cybersecurity Weekly Review: CrowdStrike, Malware, and Major IT Outages Join Jim Love and a panel of experts as they delve into the top cybersecurity stories of the week. This episode covers the major CrowdStrike incident, AT&T's February outage affecting millions of calls, a new strain of malware in Ukraine targeting industrial control systems, and much more. Listen in as experts Terry Cutler, David Shipley, and Mike Walters discuss the implications, lessons learned, and future strategies needed to tackle these cybersecurity challenges. 00:00 Introduction and Overview 00:18 CrowdStrike Dominates the Headlines 00:27 AT&T's Major Outage 01:14 New Malware in Ukraine 01:51 Whiz Startup's Bold Move 02:33 Panel Discussion Begins 02:55 Introduction of Mike Walters 03:31 Whiz's Market Valuation Debate 06:59 Modbus Protocol Vulnerabilities 07:35 Penetration Testing Insights 12:50 CrowdStrike Incident Analysis 22:24 Media Focus on Airport Chaos 22:36 The Real Impact on Patient Care 23:53 Who Pays for the Outage? 25:40 CrowdStrike's Quick Response 26:27 Future Prevention Strategies 28:27 Challenges in Cybersecurity Updates 38:14 Lessons Learned and Moving Forward 42:17 Conclusion and Acknowledgements
loading
Comments (3)

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at https://www.wizlynxgroup.com/hk/en/

May 9th
Reply

Daniel Lisa

Acronis Cyber Backup is a comprehensive data backup and recovery solution designed to protect data, systems, and applications. It's used by businesses and individuals to ensure that their critical information is safeguarded against data loss, hardware failures, cyberattacks, and other unexpected events. Acronis Cyber Backup offers features like full disk imaging, incremental backups, cloud storage, and quick recovery to keep operations running smoothly. It provides flexible deployment options, allowing backups to be stored locally or in the cloud, and integrates advanced cybersecurity features to defend against ransomware and other cyber threats. For a thorough cybersecurity assessment and data protection strategy, you might consider consulting with cybersecurity experts like those at Wizlynx Group. They specialize in security testing and cybersecurity consulting to help businesses identify vulnerabilities and implement effective defense measures. You can learn more about their servic

May 9th
Reply

Denny Luyis

When you use a third party platform that offers an app for your on-premise platform - https://www.protectimus.com/platform/ , you are automatically taking advantage of the multi-factor security that they offer. It is easy to forget when you are using your computer, tablet, or smartphone that all of your data is being tracked in some way. With the use of a Protectimus application, your data is encrypted and protected even more. You are also provided with a second layer of security as a secondary level of protection. This helps to make your business' data secure even more.

Jul 26th
Reply