Hacking
Protecting Your Clients During the Holiday Season: A Guide for Family Offices
The holiday season is a time of joy and celebration, but it’s also a prime time for cybercriminals to target high-net-worth individuals. While family offices are constantly focused on protecting their clients’ ...

Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring ...

Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million ...

Internet Archive Hacked, Introducing The AI Toilet Camera
In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health ...
Cyberattacks Against Sporting Events are Growing More Calculated
The amount of data being collected and shared online before and during large sporting events is low-hanging fruit for attackers ...

Hacked Robot Vacuums, Secret Printer Tracking Dots
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

Hackers Turn to AI as Hardware Attacks Surge
There has been a sharp increase in the perceived value of AI technologies in hacking, according to a report from Bugcrowd platform, which surveyed 1,300 ethical hackers and security researchers ...
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...
Weird Zimbra Vulnerability
Hackers can execute commands on a remote computer by sending malformed emails to a Zimbra mail server. It’s critical, but difficult to exploit reliably. In an email sent Wednesday afternoon, Proofpoint researcher ...