This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide. A new…
Category: Cybersecurity Today
FBI Shuts Down Breach Forums and New Cyber Threats Unveiled
In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI’s takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny…
The Role and Evolution of Virtual CISOs with Craig Taylor
In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor’s career path, and the founding…
Teenage Ransomware Arrest In Day Care Ransom
Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion.…
AI Tools Lead Corporate Data
North Korean Hackers Target Crypto Wealth, LinkedIn Fights Data Scraping, and AI Tools Leak Corporate Data In this episode of Cybersecurity Today, host Jim Love covers the latest cybersecurity headlines including North Korean hackers targeting wealthy crypto investors, LinkedIn suing…
Sora 2 Unveiled To Mixed Reviews
Emerging AI, Google Updates, and Falling Satellites: A Tech Rundown In this episode of hashtag Trending, host Jim Love discusses the latest developments in AI and tech. Open AI’s new app Sora 2 promises revolutionary video generation capabilities, but early…
AI Browser Steals Data
AI Browsers Turn Rogue, Discord Data Breach, and Surge in Palo Alto Scans In this episode of Cybersecurity Today, host David Shipley discusses several significant cybersecurity concerns. Firstly, researchers at Layer X have uncovered a flaw in the Perplexity Comet…
October Cybersecurity Month in Review: Insider Threats, AI’s Role, and Cybercrime Trends
In this episode of ‘Cybersecurity Today: Our Month in Review,’ host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of…
Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support
Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support In this episode of Cybersecurity Today, host Jim Love covers a recent breach of Red Hat’s consulting GitLab server, highlighting concerns over exposed network maps and tokens.…
50,000 Cisco Firewalls Exposed
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices.…
Lockbit Is Back
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China’s Cyber Intelligence Advancements In this episode of ‘Cybersecurity Today,’ host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously,…
The Complex Landscape of AI and Cybersecurity
Navigating the Complex Landscape of AI and Cybersecurity: A Conversation with Rob T. Lee In this weekend edition of Cybersecurity Today, host Jim Love interviews Rob T. Lee, the Chief AI Officer and Chief of Research at the SANS Institute.…
AI Shadow Leak Avoids Detection
Cybersecurity Today: Shadow Leak, SIM Farm Shutdown, Cisco Zero-Day, FBI Warning & Android Advanced Protection In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity issues. Key topics include the discovery of the ‘Shadow Leak’ vulnerability in…
GitHub’s NPM Lockdown, Deep Fake Threats, and Yellowknife’s Cyber Incident: Cybersecurity Today
Cybersecurity Today: GitHub’s NPM Lockdown, Deep Fake Threats, and Yellowknife’s Cyber Incident In this episode of ‘Cybersecurity Today’, host Jim Love discusses GitHub’s response to widespread supply chain attacks in the NPM ecosystem, the alarming rise of deep fake attacks…
Extinction Level Cyber Vulnerability Now Fixed
Cybersecurity Today: Major Vulnerabilities and Attacks Uncovered Join host David Shipley for today’s cybersecurity updates on the last day of summer 2025. In this episode, we delve deep into Microsoft’s critical Entra ID vulnerability, a cyber attack crippling major European…
CST Replay: The Ransomware Ecosystem with Tammy Harper
Unveiling the Ransomware Ecosystem with Tammy Harper In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned…
Cybersecurity Today – The Good News Edition
Cybersecurity Today: The Good News Edition In this episode, host Jim Love addresses a previous mistake regarding the location of Yellowknife and announces a special ‘good news’ edition. Key stories include Microsoft’s dismantling of a global phishing-as-a-service operation Raccoon 0365,…
Shai-Hulud Worm – A Self Propagating Supply Chain Threat
Cybersecurity Worms, Steganography Attacks, Municipal Cyber Incidents and More… In this episode of Cybersecurity Today, host Jim Love delves into multiple cybersecurity threats affecting the tech landscape. He discusses the ‘Shai Hulud’ worm, which has infiltrated over 187 JavaScript libraries…
NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley
Cybersecurity Today: NPM Attack, Void Proxy Phishing, and Major Business Disruptions In this episode of Cybersecurity Today, host David Shipley discusses a recent massive NPM attack that, despite causing significant disruption, left hackers with minimal gains. We also cover a…
The Godfather of Zero Trust – A Discussion with John Kindervag
Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry…